Mar 8 12:29:13.583705: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x5580564d7cc8 Mar 8 12:29:13.583709: | free_event_entry: release EVENT_NULL-pe@0x5580564d17a8 Mar 8 12:29:13.583715: | free_event_entry: release EVENT_NULL-pe@0x5580564cbea8 Mar 8 12:29:13.583718: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x5580564cbe38 Mar 8 12:29:13.583722: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x5580564c6528 Mar 8 12:29:13.583725: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x5580564c6428 Mar 8 12:29:13.583728: | free_event_entry: release EVENT_REINIT_SECRET-pe@0x5580564c62d8 Mar 8 12:29:13.583768: leak: revival conn name, item size: 8 Mar 8 12:29:13.583773: leak: revival struct, item size: 16 Mar 8 12:29:13.583779: leak detective found 2 leaks, total size 24 Mar 8 12:33:25.198836: FIPS Product: NO Mar 8 12:33:25.199023: FIPS Kernel: NO Mar 8 12:33:25.199078: FIPS Mode: NO Mar 8 12:33:25.199152: NSS DB directory: sql:/etc/ipsec.d Mar 8 12:33:25.199333: Initializing NSS Mar 8 12:33:25.199403: Opening NSS database "sql:/etc/ipsec.d" read-only Mar 8 12:33:25.311763: NSS initialized Mar 8 12:33:25.311912: NSS crypto library initialized Mar 8 12:33:25.311979: FIPS HMAC integrity support [enabled] Mar 8 12:33:25.312023: FIPS mode disabled for pluto daemon Mar 8 12:33:25.340176: FIPS HMAC integrity verification self-test passed Mar 8 12:33:25.340352: libcap-ng support [enabled] Mar 8 12:33:25.340373: Linux audit support [enabled] Mar 8 12:33:25.340395: Linux audit activated Mar 8 12:33:25.340400: Starting Pluto (Libreswan Version 3.25 XFRM(netkey) KLIPS FORK PTHREAD_SETSCHEDPRIO GCC_EXCEPTIONS NSS (AVA copy) (IPsec profile) DNSSEC SYSTEMD_WATCHDOG FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS)) pid:10188 Mar 8 12:33:25.340404: core dump dir: /run/pluto Mar 8 12:33:25.340407: secrets file: /etc/ipsec.secrets Mar 8 12:33:25.340410: leak-detective enabled Mar 8 12:33:25.340413: NSS crypto [enabled] Mar 8 12:33:25.340415: XAUTH PAM support [enabled] Mar 8 12:33:25.340474: | init_nat_traversal() initialized with keep_alive=0s Mar 8 12:33:25.340478: NAT-Traversal support [enabled] Mar 8 12:33:25.340499: Initializing libevent in pthreads mode: headers: 2.0.21-stable (2001500); library: 2.0.21-stable (2001500) Mar 8 12:33:25.340647: | event_schedule: new EVENT_REINIT_SECRET-pe@0x558b8d1be2b8 Mar 8 12:33:25.340654: | inserting event EVENT_REINIT_SECRET, timeout in 3600.000 seconds Mar 8 12:33:25.340675: | event_schedule: new EVENT_PENDING_DDNS-pe@0x558b8d1be408 Mar 8 12:33:25.340679: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Mar 8 12:33:25.340696: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x558b8d1be508 Mar 8 12:33:25.340700: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Mar 8 12:33:25.340708: | encryption algorithm assertion checks Mar 8 12:33:25.340713: | encryption algorithm AES_CCM_16; official name: aes_ccm_16, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 16, IKEv2 id: 16 Mar 8 12:33:25.340717: | IKEv1 ESP ID id: 16 enum name: AES_CCM_C Mar 8 12:33:25.340721: | IKEv2 ID id: 16 enum name: AES_CCM_C Mar 8 12:33:25.340726: | encryption algorithm AES_CCM_12; official name: aes_ccm_12, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 15, IKEv2 id: 15 Mar 8 12:33:25.340729: | IKEv1 ESP ID id: 15 enum name: AES_CCM_B Mar 8 12:33:25.340733: | IKEv2 ID id: 15 enum name: AES_CCM_B Mar 8 12:33:25.340737: | encryption algorithm AES_CCM_8; official name: aes_ccm_8, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 14, IKEv2 id: 14 Mar 8 12:33:25.340740: | IKEv1 ESP ID id: 14 enum name: AES_CCM_A Mar 8 12:33:25.340744: | IKEv2 ID id: 14 enum name: AES_CCM_A Mar 8 12:33:25.340748: | encryption algorithm 3DES_CBC; official name: 3des, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: 3, IKEv2 id: 3 Mar 8 12:33:25.340751: | IKEv1 OAKLEY ID id: 5 enum name: 3DES_CBC Mar 8 12:33:25.340765: | IKEv1 ESP ID id: 3 enum name: 3DES Mar 8 12:33:25.340768: | IKEv2 ID id: 3 enum name: 3DES Mar 8 12:33:25.340773: | encryption algorithm CAMELLIA_CTR; official name: camellia_ctr, IKEv1 OAKLEY id: 24, IKEv1 ESP_INFO id: 24, IKEv2 id: 24 Mar 8 12:33:25.340776: | IKEv1 OAKLEY ID id: 24 enum name: CAMELLIA_CTR Mar 8 12:33:25.340779: | IKEv1 ESP ID id: 24 enum name: CAMELLIA_CTR Mar 8 12:33:25.340783: | IKEv2 ID id: 24 enum name: CAMELLIA_CTR Mar 8 12:33:25.340786: | encryption algorithm CAMELLIA_CBC; official name: camellia, IKEv1 OAKLEY id: 8, IKEv1 ESP_INFO id: 22, IKEv2 id: 23 Mar 8 12:33:25.340790: | IKEv1 OAKLEY ID id: 8 enum name: CAMELLIA_CBC Mar 8 12:33:25.340793: | IKEv1 ESP ID id: 22 enum name: CAMELLIA Mar 8 12:33:25.340796: | IKEv2 ID id: 23 enum name: CAMELLIA_CBC Mar 8 12:33:25.340800: | encryption algorithm AES_GCM_16; official name: aes_gcm_16, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 20, IKEv2 id: 20 Mar 8 12:33:25.340803: | IKEv1 ESP ID id: 20 enum name: AES_GCM_C Mar 8 12:33:25.340806: | IKEv2 ID id: 20 enum name: AES_GCM_C Mar 8 12:33:25.340810: | encryption algorithm AES_GCM_12; official name: aes_gcm_12, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 19, IKEv2 id: 19 Mar 8 12:33:25.340813: | IKEv1 ESP ID id: 19 enum name: AES_GCM_B Mar 8 12:33:25.340816: | IKEv2 ID id: 19 enum name: AES_GCM_B Mar 8 12:33:25.340820: | encryption algorithm AES_GCM_8; official name: aes_gcm, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 18, IKEv2 id: 18 Mar 8 12:33:25.340823: | IKEv1 ESP ID id: 18 enum name: AES_GCM_A Mar 8 12:33:25.340826: | IKEv2 ID id: 18 enum name: AES_GCM_A Mar 8 12:33:25.340830: | encryption algorithm AES_CTR; official name: aes_ctr, IKEv1 OAKLEY id: 13, IKEv1 ESP_INFO id: 13, IKEv2 id: 13 Mar 8 12:33:25.340834: | IKEv1 OAKLEY ID id: 13 enum name: AES_CTR Mar 8 12:33:25.340837: | IKEv1 ESP ID id: 13 enum name: AES_CTR Mar 8 12:33:25.340840: | IKEv2 ID id: 13 enum name: AES_CTR Mar 8 12:33:25.340844: | encryption algorithm AES_CBC; official name: aes, IKEv1 OAKLEY id: 7, IKEv1 ESP_INFO id: 12, IKEv2 id: 12 Mar 8 12:33:25.340847: | IKEv1 OAKLEY ID id: 7 enum name: AES_CBC Mar 8 12:33:25.340850: | IKEv1 ESP ID id: 12 enum name: AES Mar 8 12:33:25.340853: | IKEv2 ID id: 12 enum name: AES_CBC Mar 8 12:33:25.340857: | encryption algorithm SERPENT_CBC; official name: serpent, IKEv1 OAKLEY id: 65004, IKEv1 ESP_INFO id: 252, IKEv2 id: 65004 Mar 8 12:33:25.340861: | IKEv1 OAKLEY ID id: 65004 enum name: SERPENT_CBC Mar 8 12:33:25.340864: | IKEv1 ESP ID id: 252 enum name: SERPENT Mar 8 12:33:25.340867: | IKEv2 ID id: 65004 enum name: SERPENT_CBC Mar 8 12:33:25.340871: | encryption algorithm TWOFISH_CBC; official name: twofish, IKEv1 OAKLEY id: 65005, IKEv1 ESP_INFO id: 253, IKEv2 id: 65005 Mar 8 12:33:25.340874: | IKEv1 OAKLEY ID id: 65005 enum name: TWOFISH_CBC Mar 8 12:33:25.340878: | IKEv1 ESP ID id: 253 enum name: TWOFISH Mar 8 12:33:25.340881: | IKEv2 ID id: 65005 enum name: TWOFISH_CBC Mar 8 12:33:25.340884: | encryption algorithm TWOFISH_SSH; official name: twofish_ssh, IKEv1 OAKLEY id: 65289, IKEv1 ESP_INFO id: -1, IKEv2 id: 65289 Mar 8 12:33:25.340888: | IKEv1 OAKLEY ID id: 65289 enum name: TWOFISH_CBC_SSH Mar 8 12:33:25.340891: | IKEv2 ID id: 65289 enum name: TWOFISH_CBC_SSH Mar 8 12:33:25.340895: | encryption algorithm CAST_CBC; official name: cast, IKEv1 OAKLEY id: 6, IKEv1 ESP_INFO id: 6, IKEv2 id: 6 Mar 8 12:33:25.340898: | IKEv1 OAKLEY ID id: 6 enum name: CAST_CBC Mar 8 12:33:25.340902: | IKEv1 ESP ID id: 6 enum name: CAST Mar 8 12:33:25.340905: | IKEv2 ID id: 6 enum name: CAST Mar 8 12:33:25.340908: | encryption algorithm NULL_AUTH_AES_GMAC; official name: NULL_AUTH_AES_GMAC, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 23, IKEv2 id: 21 Mar 8 12:33:25.340912: | IKEv1 ESP ID id: 23 enum name: NULL_AUTH_AES_GMAC Mar 8 12:33:25.340915: | IKEv2 ID id: 21 enum name: NULL_AUTH_AES_GMAC Mar 8 12:33:25.340919: | encryption algorithm NULL; official name: null, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 11, IKEv2 id: 11 Mar 8 12:33:25.340922: | IKEv1 ESP ID id: 11 enum name: NULL Mar 8 12:33:25.340927: | IKEv2 ID id: 11 enum name: NULL Mar 8 12:33:25.340931: Encryption algorithms: Mar 8 12:33:25.340936: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm aes_ccm_c) Mar 8 12:33:25.340940: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm_b) Mar 8 12:33:25.340944: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm_a) Mar 8 12:33:25.340948: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] (3des) Mar 8 12:33:25.340951: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Mar 8 12:33:25.340955: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (camellia) Mar 8 12:33:25.340972: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm aes_gcm_c) Mar 8 12:33:25.340975: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm_b) Mar 8 12:33:25.340979: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm_a) Mar 8 12:33:25.340982: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} (aesctr) Mar 8 12:33:25.340986: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes) Mar 8 12:33:25.340989: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (serpent) Mar 8 12:33:25.340992: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (twofish) Mar 8 12:33:25.340996: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} (twofish_cbc_ssh) Mar 8 12:33:25.340999: CAST_CBC IKEv1: ESP IKEv2: ESP {*128} (cast) Mar 8 12:33:25.341002: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP {256,192,*128} (aes_gmac) Mar 8 12:33:25.341006: NULL IKEv1: ESP IKEv2: ESP [] Mar 8 12:33:25.341009: | hash algorithm assertion checks Mar 8 12:33:25.341012: | hash algorithm MD5; official name: md5, IKEv1 OAKLEY id: 1, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 Mar 8 12:33:25.341015: | IKEv1 OAKLEY ID id: 1 enum name: MD5 Mar 8 12:33:25.341019: | hash algorithm SHA1; official name: sha1, IKEv1 OAKLEY id: 2, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 Mar 8 12:33:25.341022: | IKEv1 OAKLEY ID id: 2 enum name: SHA1 Mar 8 12:33:25.341026: | hash algorithm SHA2_256; official name: sha256, IKEv1 OAKLEY id: 4, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 Mar 8 12:33:25.341029: | IKEv1 OAKLEY ID id: 4 enum name: SHA2_256 Mar 8 12:33:25.341033: | hash algorithm SHA2_384; official name: sha384, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 Mar 8 12:33:25.341036: | IKEv1 OAKLEY ID id: 5 enum name: SHA2_384 Mar 8 12:33:25.341040: | hash algorithm SHA2_512; official name: sha512, IKEv1 OAKLEY id: 6, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 Mar 8 12:33:25.341043: | IKEv1 OAKLEY ID id: 6 enum name: SHA2_512 Mar 8 12:33:25.341046: Hash algorithms: Mar 8 12:33:25.341049: MD5 IKEv1: IKE IKEv2: Mar 8 12:33:25.341053: SHA1 IKEv1: IKE IKEv2: FIPS (sha) Mar 8 12:33:25.341056: SHA2_256 IKEv1: IKE IKEv2: FIPS (sha2 sha256) Mar 8 12:33:25.341059: SHA2_384 IKEv1: IKE IKEv2: FIPS (sha384) Mar 8 12:33:25.341062: SHA2_512 IKEv1: IKE IKEv2: FIPS (sha512) Mar 8 12:33:25.341065: | PRF algorithm assertion checks Mar 8 12:33:25.341068: | PRF algorithm HMAC_MD5; official name: md5, IKEv1 OAKLEY id: 1, IKEv1 ESP_INFO id: -1, IKEv2 id: 1 Mar 8 12:33:25.341071: | IKEv1 OAKLEY ID id: 1 enum name: MD5 Mar 8 12:33:25.341074: | IKEv2 ID id: 1 enum name: HMAC_MD5 Mar 8 12:33:25.341078: | PRF algorithm HMAC_SHA1; official name: sha1, IKEv1 OAKLEY id: 2, IKEv1 ESP_INFO id: -1, IKEv2 id: 2 Mar 8 12:33:25.341081: | IKEv1 OAKLEY ID id: 2 enum name: SHA1 Mar 8 12:33:25.341086: | IKEv2 ID id: 2 enum name: HMAC_SHA1 Mar 8 12:33:25.341090: | PRF algorithm HMAC_SHA2_256; official name: sha256, IKEv1 OAKLEY id: 4, IKEv1 ESP_INFO id: -1, IKEv2 id: 5 Mar 8 12:33:25.341093: | IKEv1 OAKLEY ID id: 4 enum name: SHA2_256 Mar 8 12:33:25.341096: | IKEv2 ID id: 5 enum name: HMAC_SHA2_256 Mar 8 12:33:25.341100: | PRF algorithm HMAC_SHA2_384; official name: sha384, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: -1, IKEv2 id: 6 Mar 8 12:33:25.341103: | IKEv1 OAKLEY ID id: 5 enum name: SHA2_384 Mar 8 12:33:25.341106: | IKEv2 ID id: 6 enum name: HMAC_SHA2_384 Mar 8 12:33:25.341110: | PRF algorithm HMAC_SHA2_512; official name: sha512, IKEv1 OAKLEY id: 6, IKEv1 ESP_INFO id: -1, IKEv2 id: 7 Mar 8 12:33:25.341113: | IKEv1 OAKLEY ID id: 6 enum name: SHA2_512 Mar 8 12:33:25.341116: | IKEv2 ID id: 7 enum name: HMAC_SHA2_512 Mar 8 12:33:25.341120: | PRF algorithm AES_XCBC; official name: aes_xcbc, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: -1, IKEv2 id: 4 Mar 8 12:33:25.341123: | IKEv2 ID id: 4 enum name: AES128_XCBC Mar 8 12:33:25.341126: PRF algorithms: Mar 8 12:33:25.341129: HMAC_MD5 IKEv1: IKE IKEv2: IKE (md5) Mar 8 12:33:25.341132: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS (sha sha1) Mar 8 12:33:25.341136: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS (sha2 sha256 sha2_256) Mar 8 12:33:25.341139: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS (sha384 sha2_384) Mar 8 12:33:25.341142: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS (sha512 sha2_512) Mar 8 12:33:25.341145: AES_XCBC IKEv1: IKEv2: IKE FIPS (aes128_xcbc) Mar 8 12:33:25.341148: | integrity algorithm assertion checks Mar 8 12:33:25.341151: | integrity algorithm HMAC_MD5_96; official name: md5, IKEv1 OAKLEY id: 1, IKEv1 ESP_INFO id: 1, IKEv2 id: 1 Mar 8 12:33:25.341154: | IKEv1 OAKLEY ID id: 1 enum name: MD5 Mar 8 12:33:25.341157: | IKEv1 ESP ID id: 1 enum name: HMAC_MD5 Mar 8 12:33:25.341160: | IKEv2 ID id: 1 enum name: HMAC_MD5_96 Mar 8 12:33:25.341164: | integrity algorithm HMAC_SHA1_96; official name: sha1, IKEv1 OAKLEY id: 2, IKEv1 ESP_INFO id: 2, IKEv2 id: 2 Mar 8 12:33:25.341167: | IKEv1 OAKLEY ID id: 2 enum name: SHA1 Mar 8 12:33:25.341170: | IKEv1 ESP ID id: 2 enum name: HMAC_SHA1 Mar 8 12:33:25.341174: | IKEv2 ID id: 2 enum name: HMAC_SHA1_96 Mar 8 12:33:25.341178: | integrity algorithm HMAC_SHA2_512_256; official name: sha512, IKEv1 OAKLEY id: 6, IKEv1 ESP_INFO id: 7, IKEv2 id: 14 Mar 8 12:33:25.341181: | IKEv1 OAKLEY ID id: 6 enum name: SHA2_512 Mar 8 12:33:25.341188: | IKEv1 ESP ID id: 7 enum name: HMAC_SHA2_512 Mar 8 12:33:25.341191: | IKEv2 ID id: 14 enum name: HMAC_SHA2_512_256 Mar 8 12:33:25.341195: | integrity algorithm HMAC_SHA2_384_192; official name: sha384, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: 6, IKEv2 id: 13 Mar 8 12:33:25.341198: | IKEv1 OAKLEY ID id: 5 enum name: SHA2_384 Mar 8 12:33:25.341201: | IKEv1 ESP ID id: 6 enum name: HMAC_SHA2_384 Mar 8 12:33:25.341204: | IKEv2 ID id: 13 enum name: HMAC_SHA2_384_192 Mar 8 12:33:25.341208: | integrity algorithm HMAC_SHA2_256_128; official name: sha256, IKEv1 OAKLEY id: 4, IKEv1 ESP_INFO id: 5, IKEv2 id: 12 Mar 8 12:33:25.341211: | IKEv1 OAKLEY ID id: 4 enum name: SHA2_256 Mar 8 12:33:25.341215: | IKEv1 ESP ID id: 5 enum name: HMAC_SHA2_256 Mar 8 12:33:25.341218: | IKEv2 ID id: 12 enum name: HMAC_SHA2_256_128 Mar 8 12:33:25.341221: | integrity algorithm AES_XCBC_96; official name: aes_xcbc, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 9, IKEv2 id: 5 Mar 8 12:33:25.341225: | IKEv1 ESP ID id: 9 enum name: AES_XCBC Mar 8 12:33:25.341228: | IKEv2 ID id: 5 enum name: AES_XCBC_96 Mar 8 12:33:25.341231: | integrity algorithm AES_CMAC_96; official name: aes_cmac, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 250, IKEv2 id: 8 Mar 8 12:33:25.341235: | IKEv1 ESP ID id: 250 enum name: AES_CMAC_96 Mar 8 12:33:25.341238: | IKEv2 ID id: 8 enum name: AES_CMAC_96 Mar 8 12:33:25.341244: | integrity algorithm NONE; official name: none, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 0, IKEv2 id: 0 Mar 8 12:33:25.341247: | IKEv1 ESP ID id: 0 enum name: NONE Mar 8 12:33:25.341250: | IKEv2 ID id: 0 enum name: NONE Mar 8 12:33:25.341253: Integrity algorithms: Mar 8 12:33:25.341256: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (md5 hmac_md5) Mar 8 12:33:25.341260: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha sha1 sha1_96 hmac_sha1) Mar 8 12:33:25.341263: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha512 sha2_512 hmac_sha2_512) Mar 8 12:33:25.341266: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha384 sha2_384 hmac_sha2_384) Mar 8 12:33:25.341269: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha2 sha256 sha2_256 hmac_sha2_256) Mar 8 12:33:25.341272: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH FIPS (aes_xcbc aes128_xcbc aes128_xcbc_96) Mar 8 12:33:25.341275: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS (aes_cmac) Mar 8 12:33:25.341279: NONE IKEv1: ESP IKEv2: ESP FIPS (null) Mar 8 12:33:25.341282: | DH algorithm assertion checks Mar 8 12:33:25.341285: | DH algorithm NONE; official name: none, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: -1, IKEv2 id: 0 Mar 8 12:33:25.341288: | IKEv2 ID id: 0 enum name: NONE Mar 8 12:33:25.341292: | DH algorithm MODP1024; official name: modp1024, IKEv1 OAKLEY id: 2, IKEv1 ESP_INFO id: 2, IKEv2 id: 2 Mar 8 12:33:25.341295: | IKEv1 OAKLEY ID id: 2 enum name: MODP1024 Mar 8 12:33:25.341298: | IKEv1 ESP ID id: 2 enum name: MODP1024 Mar 8 12:33:25.341301: | IKEv2 ID id: 2 enum name: MODP1024 Mar 8 12:33:25.341305: | DH algorithm MODP1536; official name: modp1536, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: 5, IKEv2 id: 5 Mar 8 12:33:25.341308: | IKEv1 OAKLEY ID id: 5 enum name: MODP1536 Mar 8 12:33:25.341311: | IKEv1 ESP ID id: 5 enum name: MODP1536 Mar 8 12:33:25.341314: | IKEv2 ID id: 5 enum name: MODP1536 Mar 8 12:33:25.341318: | DH algorithm MODP2048; official name: modp2048, IKEv1 OAKLEY id: 14, IKEv1 ESP_INFO id: 14, IKEv2 id: 14 Mar 8 12:33:25.341321: | IKEv1 OAKLEY ID id: 14 enum name: MODP2048 Mar 8 12:33:25.341324: | IKEv1 ESP ID id: 14 enum name: MODP2048 Mar 8 12:33:25.341327: | IKEv2 ID id: 14 enum name: MODP2048 Mar 8 12:33:25.341330: | DH algorithm MODP3072; official name: modp3072, IKEv1 OAKLEY id: 15, IKEv1 ESP_INFO id: 15, IKEv2 id: 15 Mar 8 12:33:25.341333: | IKEv1 OAKLEY ID id: 15 enum name: MODP3072 Mar 8 12:33:25.341336: | IKEv1 ESP ID id: 15 enum name: MODP3072 Mar 8 12:33:25.341339: | IKEv2 ID id: 15 enum name: MODP3072 Mar 8 12:33:25.341343: | DH algorithm MODP4096; official name: modp4096, IKEv1 OAKLEY id: 16, IKEv1 ESP_INFO id: 16, IKEv2 id: 16 Mar 8 12:33:25.341346: | IKEv1 OAKLEY ID id: 16 enum name: MODP4096 Mar 8 12:33:25.341349: | IKEv1 ESP ID id: 16 enum name: MODP4096 Mar 8 12:33:25.341352: | IKEv2 ID id: 16 enum name: MODP4096 Mar 8 12:33:25.341356: | DH algorithm MODP6144; official name: modp6144, IKEv1 OAKLEY id: 17, IKEv1 ESP_INFO id: 17, IKEv2 id: 17 Mar 8 12:33:25.341359: | IKEv1 OAKLEY ID id: 17 enum name: MODP6144 Mar 8 12:33:25.341362: | IKEv1 ESP ID id: 17 enum name: MODP6144 Mar 8 12:33:25.341365: | IKEv2 ID id: 17 enum name: MODP6144 Mar 8 12:33:25.341368: | DH algorithm MODP8192; official name: modp8192, IKEv1 OAKLEY id: 18, IKEv1 ESP_INFO id: 18, IKEv2 id: 18 Mar 8 12:33:25.341371: | IKEv1 OAKLEY ID id: 18 enum name: MODP8192 Mar 8 12:33:25.341374: | IKEv1 ESP ID id: 18 enum name: MODP8192 Mar 8 12:33:25.341377: | IKEv2 ID id: 18 enum name: MODP8192 Mar 8 12:33:25.341381: | DH algorithm DH19; official name: dh19, IKEv1 OAKLEY id: 19, IKEv1 ESP_INFO id: -1, IKEv2 id: 19 Mar 8 12:33:25.341384: | IKEv1 OAKLEY ID id: 19 enum name: ECP_256 Mar 8 12:33:25.341387: | IKEv2 ID id: 19 enum name: ECP_256 Mar 8 12:33:25.341390: | DH algorithm DH20; official name: dh20, IKEv1 OAKLEY id: 20, IKEv1 ESP_INFO id: -1, IKEv2 id: 20 Mar 8 12:33:25.341395: | IKEv1 OAKLEY ID id: 20 enum name: ECP_384 Mar 8 12:33:25.341399: | IKEv2 ID id: 20 enum name: ECP_384 Mar 8 12:33:25.341402: | DH algorithm DH21; official name: dh21, IKEv1 OAKLEY id: 21, IKEv1 ESP_INFO id: -1, IKEv2 id: 21 Mar 8 12:33:25.341405: | IKEv1 OAKLEY ID id: 21 enum name: ECP_521 Mar 8 12:33:25.341408: | IKEv2 ID id: 21 enum name: ECP_521 Mar 8 12:33:25.341412: | DH algorithm DH22; official name: dh22, IKEv1 OAKLEY id: 22, IKEv1 ESP_INFO id: 22, IKEv2 id: 22 Mar 8 12:33:25.341415: | IKEv1 OAKLEY ID id: 22 enum name: DH22 Mar 8 12:33:25.341418: | IKEv1 ESP ID id: 22 enum name: DH22 Mar 8 12:33:25.341421: | IKEv2 ID id: 22 enum name: DH22 Mar 8 12:33:25.341424: | DH algorithm DH23; official name: dh23, IKEv1 OAKLEY id: 23, IKEv1 ESP_INFO id: 23, IKEv2 id: 23 Mar 8 12:33:25.341427: | IKEv1 OAKLEY ID id: 23 enum name: DH23 Mar 8 12:33:25.341430: | IKEv1 ESP ID id: 23 enum name: DH23 Mar 8 12:33:25.341433: | IKEv2 ID id: 23 enum name: DH23 Mar 8 12:33:25.341437: | DH algorithm DH24; official name: dh24, IKEv1 OAKLEY id: 24, IKEv1 ESP_INFO id: 24, IKEv2 id: 24 Mar 8 12:33:25.341440: | IKEv1 OAKLEY ID id: 24 enum name: DH24 Mar 8 12:33:25.341443: | IKEv1 ESP ID id: 24 enum name: DH24 Mar 8 12:33:25.341446: | IKEv2 ID id: 24 enum name: DH24 Mar 8 12:33:25.341449: DH algorithms: Mar 8 12:33:25.342041: NONE IKEv1: IKEv2: IKE ESP AH (null dh0) Mar 8 12:33:25.342089: MODP1024 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (dh2) Mar 8 12:33:25.342138: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (dh5) Mar 8 12:33:25.342182: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh14) Mar 8 12:33:25.342225: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh15) Mar 8 12:33:25.342268: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh16) Mar 8 12:33:25.342312: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh17) Mar 8 12:33:25.342355: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh18) Mar 8 12:33:25.342448: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_256) Mar 8 12:33:25.342513: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_384) Mar 8 12:33:25.342569: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_521) Mar 8 12:33:25.342636: DH22 IKEv1: IKE ESP AH IKEv2: IKE ESP AH Mar 8 12:33:25.342705: DH23 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS Mar 8 12:33:25.342773: DH24 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS Mar 8 12:33:25.342842: | test_cbc_vector: Camellia: 16 bytes with 128-bit key Mar 8 12:33:25.342905: | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.342960: | decode_to_chunk: output: Mar 8 12:33:25.343028: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.343225: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.343330: | decode_to_chunk: output: Mar 8 12:33:25.343400: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.343466: | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" Mar 8 12:33:25.343557: | decode_to_chunk: output: Mar 8 12:33:25.343636: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c Mar 8 12:33:25.343708: | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.343791: | decode_to_chunk: output: Mar 8 12:33:25.343877: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.343961: | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" Mar 8 12:33:25.344046: | decode_to_chunk: output: Mar 8 12:33:25.344125: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c Mar 8 12:33:25.344189: | NSS ike_alg_nss_cbc: camellia - enter Mar 8 12:33:25.344288: | NSS ike_alg_nss_cbc: camellia - exit Mar 8 12:33:25.344362: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.344444: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.344523: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.344591: | decode_to_chunk: output: Mar 8 12:33:25.344680: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.344754: | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" Mar 8 12:33:25.344830: | decode_to_chunk: output: Mar 8 12:33:25.344888: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c Mar 8 12:33:25.344968: | decode_to_chunk: cipertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" Mar 8 12:33:25.345045: | decode_to_chunk: output: Mar 8 12:33:25.345133: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c Mar 8 12:33:25.345212: | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.345287: | decode_to_chunk: output: Mar 8 12:33:25.345367: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.345435: | NSS ike_alg_nss_cbc: camellia - enter Mar 8 12:33:25.345560: | NSS ike_alg_nss_cbc: camellia - exit Mar 8 12:33:25.345630: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.345719: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.345809: | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed Mar 8 12:33:25.345902: | test_cbc_vector: Camellia: 16 bytes with 128-bit key Mar 8 12:33:25.345984: | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" Mar 8 12:33:25.346071: | decode_to_chunk: output: Mar 8 12:33:25.346123: | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff Mar 8 12:33:25.346248: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.346329: | decode_to_chunk: output: Mar 8 12:33:25.346404: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.346479: | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" Mar 8 12:33:25.346561: | decode_to_chunk: output: Mar 8 12:33:25.346614: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 Mar 8 12:33:25.346680: | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " Mar 8 12:33:25.346734: | decode_to_chunk: output: Mar 8 12:33:25.346795: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 Mar 8 12:33:25.346854: | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" Mar 8 12:33:25.346906: | decode_to_chunk: output: Mar 8 12:33:25.346967: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 Mar 8 12:33:25.347043: | NSS ike_alg_nss_cbc: camellia - enter Mar 8 12:33:25.347109: | NSS ike_alg_nss_cbc: camellia - exit Mar 8 12:33:25.347174: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.347224: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.347284: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.347343: | decode_to_chunk: output: Mar 8 12:33:25.347395: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.347458: | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" Mar 8 12:33:25.347513: | decode_to_chunk: output: Mar 8 12:33:25.347565: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 Mar 8 12:33:25.347626: | decode_to_chunk: cipertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" Mar 8 12:33:25.347697: | decode_to_chunk: output: Mar 8 12:33:25.347764: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 Mar 8 12:33:25.347827: | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " Mar 8 12:33:25.347886: | decode_to_chunk: output: Mar 8 12:33:25.347999: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 Mar 8 12:33:25.348079: | NSS ike_alg_nss_cbc: camellia - enter Mar 8 12:33:25.348143: | NSS ike_alg_nss_cbc: camellia - exit Mar 8 12:33:25.348256: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.348324: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.348405: | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed Mar 8 12:33:25.348478: | test_cbc_vector: Camellia: 16 bytes with 256-bit key Mar 8 12:33:25.348576: | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.348669: | decode_to_chunk: output: Mar 8 12:33:25.348700: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.348777: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.348837: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.348912: | decode_to_chunk: output: Mar 8 12:33:25.348958: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.348991: | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" Mar 8 12:33:25.349061: | decode_to_chunk: output: Mar 8 12:33:25.349098: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d Mar 8 12:33:25.349137: | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.349174: | decode_to_chunk: output: Mar 8 12:33:25.349236: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.349271: | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" Mar 8 12:33:25.349337: | decode_to_chunk: output: Mar 8 12:33:25.349382: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d Mar 8 12:33:25.349414: | NSS ike_alg_nss_cbc: camellia - enter Mar 8 12:33:25.349447: | NSS ike_alg_nss_cbc: camellia - exit Mar 8 12:33:25.349559: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.349638: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.349676: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.349708: | decode_to_chunk: output: Mar 8 12:33:25.349733: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.349758: | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" Mar 8 12:33:25.349783: | decode_to_chunk: output: Mar 8 12:33:25.349853: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d Mar 8 12:33:25.349899: | decode_to_chunk: cipertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" Mar 8 12:33:25.349971: | decode_to_chunk: output: Mar 8 12:33:25.350005: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d Mar 8 12:33:25.350030: | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.350062: | decode_to_chunk: output: Mar 8 12:33:25.350119: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.350150: | NSS ike_alg_nss_cbc: camellia - enter Mar 8 12:33:25.350238: | NSS ike_alg_nss_cbc: camellia - exit Mar 8 12:33:25.350322: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.350378: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.350479: | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed Mar 8 12:33:25.350564: | test_cbc_vector: Camellia: 16 bytes with 256-bit key Mar 8 12:33:25.350642: | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" Mar 8 12:33:25.350731: | decode_to_chunk: output: Mar 8 12:33:25.350762: | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff Mar 8 12:33:25.350794: | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 Mar 8 12:33:25.350864: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.350932: | decode_to_chunk: output: Mar 8 12:33:25.350988: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.351048: | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " Mar 8 12:33:25.351113: | decode_to_chunk: output: Mar 8 12:33:25.351149: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 Mar 8 12:33:25.351185: | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" Mar 8 12:33:25.351243: | decode_to_chunk: output: Mar 8 12:33:25.351276: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 Mar 8 12:33:25.351313: | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " Mar 8 12:33:25.351390: | decode_to_chunk: output: Mar 8 12:33:25.351436: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 Mar 8 12:33:25.351502: | NSS ike_alg_nss_cbc: camellia - enter Mar 8 12:33:25.351545: | NSS ike_alg_nss_cbc: camellia - exit Mar 8 12:33:25.351580: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.351651: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.351687: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Mar 8 12:33:25.351718: | decode_to_chunk: output: Mar 8 12:33:25.351794: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.351830: | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " Mar 8 12:33:25.351861: | decode_to_chunk: output: Mar 8 12:33:25.351886: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 Mar 8 12:33:25.351923: | decode_to_chunk: cipertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " Mar 8 12:33:25.351986: | decode_to_chunk: output: Mar 8 12:33:25.352021: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 Mar 8 12:33:25.352051: | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" Mar 8 12:33:25.352077: | decode_to_chunk: output: Mar 8 12:33:25.352151: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 Mar 8 12:33:25.352185: | NSS ike_alg_nss_cbc: camellia - enter Mar 8 12:33:25.352257: | NSS ike_alg_nss_cbc: camellia - exit Mar 8 12:33:25.352336: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.352371: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.352405: | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed Mar 8 12:33:25.352432: | test_gcm_vector: enter Mar 8 12:33:25.352499: | decode_to_chunk: raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" Mar 8 12:33:25.352548: | decode_to_chunk: output: Mar 8 12:33:25.352574: | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 Mar 8 12:33:25.352625: | decode_to_chunk: salted IV: input "0x113b9785971864c83b01c787" Mar 8 12:33:25.352703: | decode_to_chunk: output: Mar 8 12:33:25.352740: | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 Mar 8 12:33:25.352770: | decode_to_chunk: AAD: input "" Mar 8 12:33:25.352840: | decode_to_chunk: output: Mar 8 12:33:25.352876: | Mar 8 12:33:25.352907: | decode_to_chunk: plaintext: input "" Mar 8 12:33:25.352963: | decode_to_chunk: output: Mar 8 12:33:25.353009: | Mar 8 12:33:25.353040: | decode_to_chunk: ciphertext: input "" Mar 8 12:33:25.353066: | decode_to_chunk: output: Mar 8 12:33:25.353137: | Mar 8 12:33:25.353169: | decode_to_chunk: tag: input "0x72ac8493e3a5228b5d130a69d2510e42" Mar 8 12:33:25.353201: | decode_to_chunk: output: Mar 8 12:33:25.353226: | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 Mar 8 12:33:25.353266: | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 Mar 8 12:33:25.353292: | test_gcm_vector: text+tag on call Mar 8 12:33:25.353354: | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 Mar 8 12:33:25.353414: | verify_chunk_data: output ciphertext: ok Mar 8 12:33:25.353468: | verify_chunk_data: TAG: ok Mar 8 12:33:25.353501: | test_gcm_vector: text+tag on return Mar 8 12:33:25.353561: | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 Mar 8 12:33:25.353598: | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 Mar 8 12:33:25.353628: | test_gcm_vector: text+tag on call Mar 8 12:33:25.353697: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.353741: | verify_chunk_data: output ciphertext: ok Mar 8 12:33:25.353774: | verify_chunk_data: TAG: ok Mar 8 12:33:25.353798: | test_gcm_vector: text+tag on return Mar 8 12:33:25.353873: | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 Mar 8 12:33:25.353910: | test_gcm_vector: passed Mar 8 12:33:25.353995: | test_gcm_vector: enter Mar 8 12:33:25.354069: | decode_to_chunk: raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" Mar 8 12:33:25.354106: | decode_to_chunk: output: Mar 8 12:33:25.354131: | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a Mar 8 12:33:25.354225: | decode_to_chunk: salted IV: input "0x8b23299fde174053f3d652ba" Mar 8 12:33:25.354312: | decode_to_chunk: output: Mar 8 12:33:25.354380: | 8b 23 29 9f de 17 40 53 f3 d6 52 ba Mar 8 12:33:25.354424: | decode_to_chunk: AAD: input "" Mar 8 12:33:25.354497: | decode_to_chunk: output: Mar 8 12:33:25.354533: | Mar 8 12:33:25.354563: | decode_to_chunk: plaintext: input "0x28286a321293253c3e0aa2704a278032" Mar 8 12:33:25.354601: | decode_to_chunk: output: Mar 8 12:33:25.354670: | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 Mar 8 12:33:25.354706: | decode_to_chunk: ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" Mar 8 12:33:25.354737: | decode_to_chunk: output: Mar 8 12:33:25.354773: | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Mar 8 12:33:25.354837: | decode_to_chunk: tag: input "0x23c7ab0f952b7091cd324835043b5eb5" Mar 8 12:33:25.354874: | decode_to_chunk: output: Mar 8 12:33:25.354934: | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 Mar 8 12:33:25.354979: | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 Mar 8 12:33:25.355046: | test_gcm_vector: text+tag on call Mar 8 12:33:25.355081: | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Mar 8 12:33:25.355111: | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 Mar 8 12:33:25.355158: | verify_chunk_data: output ciphertext: ok Mar 8 12:33:25.355237: | verify_chunk_data: TAG: ok Mar 8 12:33:25.355269: | test_gcm_vector: text+tag on return Mar 8 12:33:25.355347: | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 Mar 8 12:33:25.355379: | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 Mar 8 12:33:25.355410: | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 Mar 8 12:33:25.355435: | test_gcm_vector: text+tag on call Mar 8 12:33:25.355463: | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 Mar 8 12:33:25.355532: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.355575: | verify_chunk_data: output ciphertext: ok Mar 8 12:33:25.355608: | verify_chunk_data: TAG: ok Mar 8 12:33:25.355647: | test_gcm_vector: text+tag on return Mar 8 12:33:25.355708: | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Mar 8 12:33:25.355743: | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 Mar 8 12:33:25.355776: | test_gcm_vector: passed Mar 8 12:33:25.355849: | test_gcm_vector: enter Mar 8 12:33:25.355885: | decode_to_chunk: raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" Mar 8 12:33:25.355916: | decode_to_chunk: output: Mar 8 12:33:25.355942: | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d Mar 8 12:33:25.356000: | decode_to_chunk: salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" Mar 8 12:33:25.356067: | decode_to_chunk: output: Mar 8 12:33:25.356123: | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 Mar 8 12:33:25.356207: | decode_to_chunk: AAD: input "" Mar 8 12:33:25.356244: | decode_to_chunk: output: Mar 8 12:33:25.356269: | Mar 8 12:33:25.356299: | decode_to_chunk: plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" Mar 8 12:33:25.356325: | decode_to_chunk: output: Mar 8 12:33:25.356394: | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 Mar 8 12:33:25.356430: | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a Mar 8 12:33:25.356455: | decode_to_chunk: ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" Mar 8 12:33:25.356487: | decode_to_chunk: output: Mar 8 12:33:25.356527: | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c Mar 8 12:33:25.356601: | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 Mar 8 12:33:25.356641: | decode_to_chunk: tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" Mar 8 12:33:25.356715: | decode_to_chunk: output: Mar 8 12:33:25.356755: | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e Mar 8 12:33:25.356820: | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 Mar 8 12:33:25.356859: | test_gcm_vector: text+tag on call Mar 8 12:33:25.356883: | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c Mar 8 12:33:25.356913: | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 Mar 8 12:33:25.356994: | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e Mar 8 12:33:25.357036: | verify_chunk_data: output ciphertext: ok Mar 8 12:33:25.357105: | verify_chunk_data: TAG: ok Mar 8 12:33:25.357153: | test_gcm_vector: text+tag on return Mar 8 12:33:25.357215: | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 Mar 8 12:33:25.357249: | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a Mar 8 12:33:25.357279: | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e Mar 8 12:33:25.357350: | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 Mar 8 12:33:25.357386: | test_gcm_vector: text+tag on call Mar 8 12:33:25.357478: | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 Mar 8 12:33:25.357569: | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a Mar 8 12:33:25.357605: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.357643: | verify_chunk_data: output ciphertext: ok Mar 8 12:33:25.357717: | verify_chunk_data: TAG: ok Mar 8 12:33:25.357762: | test_gcm_vector: text+tag on return Mar 8 12:33:25.357795: | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c Mar 8 12:33:25.357856: | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 Mar 8 12:33:25.357903: | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e Mar 8 12:33:25.357968: | test_gcm_vector: passed Mar 8 12:33:25.357999: | test_gcm_vector: enter Mar 8 12:33:25.358073: | decode_to_chunk: raw_key: input "0x006c458100fc5f4d62949d2c833b82d1" Mar 8 12:33:25.358109: | decode_to_chunk: output: Mar 8 12:33:25.358140: | 00 6c 45 81 00 fc 5f 4d 62 94 9d 2c 83 3b 82 d1 Mar 8 12:33:25.358199: | decode_to_chunk: salted IV: input "0xa4e9c4bc5725a21ff42c82b2" Mar 8 12:33:25.358304: | decode_to_chunk: output: Mar 8 12:33:25.358339: | a4 e9 c4 bc 57 25 a2 1f f4 2c 82 b2 Mar 8 12:33:25.358370: | decode_to_chunk: AAD: input "0x2efb14fb3657cdd6b9a8ff1a5f5a39b9" Mar 8 12:33:25.358443: | decode_to_chunk: output: Mar 8 12:33:25.358478: | 2e fb 14 fb 36 57 cd d6 b9 a8 ff 1a 5f 5a 39 b9 Mar 8 12:33:25.358539: | decode_to_chunk: plaintext: input "0xf381d3bfbee0a879f7a4e17b623278cedd6978053dd313530a18f1a836100950" Mar 8 12:33:25.358588: | decode_to_chunk: output: Mar 8 12:33:25.358621: | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce Mar 8 12:33:25.358679: | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 Mar 8 12:33:25.358714: | decode_to_chunk: ciphertext: input "0xf39b4db3542d8542fb73fd2d66be568f26d7f814b3f87d1eceac3dd09a8d697e" Mar 8 12:33:25.358746: | decode_to_chunk: output: Mar 8 12:33:25.358785: | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f Mar 8 12:33:25.358855: | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e Mar 8 12:33:25.358891: | decode_to_chunk: tag: input "0x39f045cb23b698c925db134d56c5" Mar 8 12:33:25.358923: | decode_to_chunk: output: Mar 8 12:33:25.358974: | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 Mar 8 12:33:25.359000: | test_gcm_vector: decrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 Mar 8 12:33:25.359058: | test_gcm_vector: text+tag on call Mar 8 12:33:25.359104: | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f Mar 8 12:33:25.359134: | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e Mar 8 12:33:25.359174: | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 Mar 8 12:33:25.359245: | verify_chunk_data: output ciphertext: ok Mar 8 12:33:25.359278: | verify_chunk_data: TAG: ok Mar 8 12:33:25.359347: | test_gcm_vector: text+tag on return Mar 8 12:33:25.359396: | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce Mar 8 12:33:25.359429: | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 Mar 8 12:33:25.359458: | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 Mar 8 12:33:25.359518: | test_gcm_vector: encrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 Mar 8 12:33:25.359566: | test_gcm_vector: text+tag on call Mar 8 12:33:25.359598: | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce Mar 8 12:33:25.359639: | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 Mar 8 12:33:25.359701: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Mar 8 12:33:25.359744: | verify_chunk_data: output ciphertext: ok Mar 8 12:33:25.359776: | verify_chunk_data: TAG: ok Mar 8 12:33:25.359849: | test_gcm_vector: text+tag on return Mar 8 12:33:25.359884: | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f Mar 8 12:33:25.359914: | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e Mar 8 12:33:25.359986: | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 Mar 8 12:33:25.360025: | test_gcm_vector: passed Mar 8 12:33:25.360052: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key Mar 8 12:33:25.360076: | decode_to_chunk: raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" Mar 8 12:33:25.360114: | decode_to_chunk: output: Mar 8 12:33:25.360179: | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e Mar 8 12:33:25.360241: | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" Mar 8 12:33:25.360320: | decode_to_chunk: output: Mar 8 12:33:25.360374: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 Mar 8 12:33:25.360454: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Mar 8 12:33:25.360528: | decode_to_chunk: output: Mar 8 12:33:25.360567: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Mar 8 12:33:25.360592: | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" Mar 8 12:33:25.360622: | decode_to_chunk: output: Mar 8 12:33:25.360659: | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 Mar 8 12:33:25.360719: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" Mar 8 12:33:25.360751: | decode_to_chunk: output: Mar 8 12:33:25.360781: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 Mar 8 12:33:25.360806: | do_aes_ctr: enter Mar 8 12:33:25.360873: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Mar 8 12:33:25.360905: | do_aes_ctr: exit Mar 8 12:33:25.360935: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.361014: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.361062: | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" Mar 8 12:33:25.361092: | decode_to_chunk: output: Mar 8 12:33:25.361123: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 Mar 8 12:33:25.361182: | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" Mar 8 12:33:25.361230: | decode_to_chunk: output: Mar 8 12:33:25.361255: | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 Mar 8 12:33:25.361322: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Mar 8 12:33:25.361354: | decode_to_chunk: output: Mar 8 12:33:25.361392: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Mar 8 12:33:25.361466: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" Mar 8 12:33:25.361507: | decode_to_chunk: output: Mar 8 12:33:25.361549: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 Mar 8 12:33:25.361576: | do_aes_ctr: enter Mar 8 12:33:25.361619: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Mar 8 12:33:25.361684: | do_aes_ctr: exit Mar 8 12:33:25.361740: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.361784: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.361869: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key passed Mar 8 12:33:25.361907: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key Mar 8 12:33:25.361943: | decode_to_chunk: raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" Mar 8 12:33:25.361981: | decode_to_chunk: output: Mar 8 12:33:25.362043: | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 Mar 8 12:33:25.362097: | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" Mar 8 12:33:25.362181: | decode_to_chunk: output: Mar 8 12:33:25.362213: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 Mar 8 12:33:25.362243: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Mar 8 12:33:25.362269: | decode_to_chunk: output: Mar 8 12:33:25.362337: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.362372: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.362401: | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" Mar 8 12:33:25.362475: | decode_to_chunk: output: Mar 8 12:33:25.362511: | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Mar 8 12:33:25.362540: | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 Mar 8 12:33:25.362564: | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" Mar 8 12:33:25.362589: | decode_to_chunk: output: Mar 8 12:33:25.362657: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 Mar 8 12:33:25.362692: | do_aes_ctr: enter Mar 8 12:33:25.362729: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Mar 8 12:33:25.362771: | do_aes_ctr: exit Mar 8 12:33:25.362830: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.362864: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.362894: | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" Mar 8 12:33:25.362982: | decode_to_chunk: output: Mar 8 12:33:25.363012: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 Mar 8 12:33:25.363041: | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" Mar 8 12:33:25.363097: | decode_to_chunk: output: Mar 8 12:33:25.363130: | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Mar 8 12:33:25.363171: | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 Mar 8 12:33:25.363239: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Mar 8 12:33:25.363270: | decode_to_chunk: output: Mar 8 12:33:25.363299: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.363322: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.363403: | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" Mar 8 12:33:25.363439: | decode_to_chunk: output: Mar 8 12:33:25.363470: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 Mar 8 12:33:25.363527: | do_aes_ctr: enter Mar 8 12:33:25.363567: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Mar 8 12:33:25.363593: | do_aes_ctr: exit Mar 8 12:33:25.363667: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.363697: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.363730: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key passed Mar 8 12:33:25.363772: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key Mar 8 12:33:25.363846: | decode_to_chunk: raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" Mar 8 12:33:25.363878: | decode_to_chunk: output: Mar 8 12:33:25.363909: | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc Mar 8 12:33:25.363977: | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" Mar 8 12:33:25.364059: | decode_to_chunk: output: Mar 8 12:33:25.364127: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 Mar 8 12:33:25.364196: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Mar 8 12:33:25.364233: | decode_to_chunk: output: Mar 8 12:33:25.364277: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.364337: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.364365: | 20 21 22 23 Mar 8 12:33:25.364407: | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" Mar 8 12:33:25.364493: | decode_to_chunk: output: Mar 8 12:33:25.364528: | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 Mar 8 12:33:25.364558: | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 Mar 8 12:33:25.364595: | 25 b2 07 2f Mar 8 12:33:25.364621: | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" Mar 8 12:33:25.364691: | decode_to_chunk: output: Mar 8 12:33:25.364726: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 Mar 8 12:33:25.364750: | do_aes_ctr: enter Mar 8 12:33:25.364830: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Mar 8 12:33:25.364900: | do_aes_ctr: exit Mar 8 12:33:25.364936: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.364960: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.364990: | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" Mar 8 12:33:25.365028: | decode_to_chunk: output: Mar 8 12:33:25.365098: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 Mar 8 12:33:25.365133: | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" Mar 8 12:33:25.365167: | decode_to_chunk: output: Mar 8 12:33:25.365204: | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 Mar 8 12:33:25.365274: | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 Mar 8 12:33:25.365319: | 25 b2 07 2f Mar 8 12:33:25.365349: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Mar 8 12:33:25.365418: | decode_to_chunk: output: Mar 8 12:33:25.365474: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.365539: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.365586: | 20 21 22 23 Mar 8 12:33:25.365656: | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" Mar 8 12:33:25.365707: | decode_to_chunk: output: Mar 8 12:33:25.365734: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 Mar 8 12:33:25.365800: | do_aes_ctr: enter Mar 8 12:33:25.365848: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Mar 8 12:33:25.365876: | do_aes_ctr: exit Mar 8 12:33:25.365946: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.365980: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.366013: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key passed Mar 8 12:33:25.366082: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key Mar 8 12:33:25.366118: | decode_to_chunk: raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" Mar 8 12:33:25.366179: | decode_to_chunk: output: Mar 8 12:33:25.366226: | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed Mar 8 12:33:25.366288: | 86 3d 06 cc fd b7 85 15 Mar 8 12:33:25.366348: | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" Mar 8 12:33:25.366424: | decode_to_chunk: output: Mar 8 12:33:25.366506: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 Mar 8 12:33:25.366541: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Mar 8 12:33:25.366589: | decode_to_chunk: output: Mar 8 12:33:25.366648: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Mar 8 12:33:25.366693: | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" Mar 8 12:33:25.366731: | decode_to_chunk: output: Mar 8 12:33:25.366755: | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 Mar 8 12:33:25.366825: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" Mar 8 12:33:25.366861: | decode_to_chunk: output: Mar 8 12:33:25.366892: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 Mar 8 12:33:25.366960: | do_aes_ctr: enter Mar 8 12:33:25.367008: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Mar 8 12:33:25.367072: | do_aes_ctr: exit Mar 8 12:33:25.367119: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.367177: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.367213: | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" Mar 8 12:33:25.367255: | decode_to_chunk: output: Mar 8 12:33:25.367320: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 Mar 8 12:33:25.367355: | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" Mar 8 12:33:25.367387: | decode_to_chunk: output: Mar 8 12:33:25.367459: | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 Mar 8 12:33:25.367494: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Mar 8 12:33:25.367525: | decode_to_chunk: output: Mar 8 12:33:25.367549: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Mar 8 12:33:25.367588: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" Mar 8 12:33:25.367614: | decode_to_chunk: output: Mar 8 12:33:25.367673: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 Mar 8 12:33:25.367719: | do_aes_ctr: enter Mar 8 12:33:25.367757: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Mar 8 12:33:25.367816: | do_aes_ctr: exit Mar 8 12:33:25.367851: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.367881: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.367983: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key passed Mar 8 12:33:25.368015: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key Mar 8 12:33:25.368045: | decode_to_chunk: raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" Mar 8 12:33:25.368085: | decode_to_chunk: output: Mar 8 12:33:25.368109: | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c Mar 8 12:33:25.368133: | 67 8c 3d b8 e6 f6 a9 1a Mar 8 12:33:25.368176: | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" Mar 8 12:33:25.368268: | decode_to_chunk: output: Mar 8 12:33:25.368334: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 Mar 8 12:33:25.368368: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Mar 8 12:33:25.368399: | decode_to_chunk: output: Mar 8 12:33:25.368422: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.368476: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.368510: | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" Mar 8 12:33:25.368535: | decode_to_chunk: output: Mar 8 12:33:25.368609: | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f Mar 8 12:33:25.368656: | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 Mar 8 12:33:25.368724: | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" Mar 8 12:33:25.368769: | decode_to_chunk: output: Mar 8 12:33:25.368801: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 Mar 8 12:33:25.368826: | do_aes_ctr: enter Mar 8 12:33:25.368904: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Mar 8 12:33:25.368945: | do_aes_ctr: exit Mar 8 12:33:25.368994: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.369066: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.369107: | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" Mar 8 12:33:25.369134: | decode_to_chunk: output: Mar 8 12:33:25.369207: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 Mar 8 12:33:25.369242: | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" Mar 8 12:33:25.369273: | decode_to_chunk: output: Mar 8 12:33:25.369325: | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f Mar 8 12:33:25.369396: | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 Mar 8 12:33:25.369434: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Mar 8 12:33:25.369490: | decode_to_chunk: output: Mar 8 12:33:25.369560: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.369595: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.369637: | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" Mar 8 12:33:25.369719: | decode_to_chunk: output: Mar 8 12:33:25.369750: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 Mar 8 12:33:25.369780: | do_aes_ctr: enter Mar 8 12:33:25.369810: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Mar 8 12:33:25.369851: | do_aes_ctr: exit Mar 8 12:33:25.369876: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.369934: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.369972: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key passed Mar 8 12:33:25.370003: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key Mar 8 12:33:25.370042: | decode_to_chunk: raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" Mar 8 12:33:25.370102: | decode_to_chunk: output: Mar 8 12:33:25.370150: | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b Mar 8 12:33:25.370178: | f5 9b 60 a7 86 d3 e0 fe Mar 8 12:33:25.370268: | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" Mar 8 12:33:25.370338: | decode_to_chunk: output: Mar 8 12:33:25.370384: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 Mar 8 12:33:25.370445: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Mar 8 12:33:25.370480: | decode_to_chunk: output: Mar 8 12:33:25.370509: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.370577: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.370610: | 20 21 22 23 Mar 8 12:33:25.370634: | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" Mar 8 12:33:25.370664: | decode_to_chunk: output: Mar 8 12:33:25.370752: | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 Mar 8 12:33:25.370788: | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 Mar 8 12:33:25.370818: | ab ee 09 35 Mar 8 12:33:25.370842: | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" Mar 8 12:33:25.370914: | decode_to_chunk: output: Mar 8 12:33:25.370949: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 Mar 8 12:33:25.370979: | do_aes_ctr: enter Mar 8 12:33:25.371022: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Mar 8 12:33:25.371097: | do_aes_ctr: exit Mar 8 12:33:25.371131: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.371160: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.371228: | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" Mar 8 12:33:25.371263: | decode_to_chunk: output: Mar 8 12:33:25.371338: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 Mar 8 12:33:25.371373: | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" Mar 8 12:33:25.371424: | decode_to_chunk: output: Mar 8 12:33:25.371451: | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 Mar 8 12:33:25.371485: | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 Mar 8 12:33:25.371546: | ab ee 09 35 Mar 8 12:33:25.371581: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Mar 8 12:33:25.371653: | decode_to_chunk: output: Mar 8 12:33:25.371688: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.371718: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.371742: | 20 21 22 23 Mar 8 12:33:25.371765: | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" Mar 8 12:33:25.371827: | decode_to_chunk: output: Mar 8 12:33:25.371881: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 Mar 8 12:33:25.371908: | do_aes_ctr: enter Mar 8 12:33:25.371997: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Mar 8 12:33:25.372029: | do_aes_ctr: exit Mar 8 12:33:25.372101: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.372136: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.372167: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key passed Mar 8 12:33:25.372191: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key Mar 8 12:33:25.372214: | decode_to_chunk: raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" Mar 8 12:33:25.372285: | decode_to_chunk: output: Mar 8 12:33:25.372319: | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c Mar 8 12:33:25.372347: | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 Mar 8 12:33:25.372436: | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" Mar 8 12:33:25.372505: | decode_to_chunk: output: Mar 8 12:33:25.372534: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 Mar 8 12:33:25.372562: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Mar 8 12:33:25.372638: | decode_to_chunk: output: Mar 8 12:33:25.372684: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Mar 8 12:33:25.372724: | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" Mar 8 12:33:25.372787: | decode_to_chunk: output: Mar 8 12:33:25.372822: | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 Mar 8 12:33:25.372891: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" Mar 8 12:33:25.372941: | decode_to_chunk: output: Mar 8 12:33:25.373001: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 Mar 8 12:33:25.373037: | do_aes_ctr: enter Mar 8 12:33:25.373073: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Mar 8 12:33:25.373146: | do_aes_ctr: exit Mar 8 12:33:25.373222: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.373291: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.373346: | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" Mar 8 12:33:25.373377: | decode_to_chunk: output: Mar 8 12:33:25.373406: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 Mar 8 12:33:25.373487: | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" Mar 8 12:33:25.373526: | decode_to_chunk: output: Mar 8 12:33:25.373558: | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 Mar 8 12:33:25.373583: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Mar 8 12:33:25.373662: | decode_to_chunk: output: Mar 8 12:33:25.373709: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Mar 8 12:33:25.373774: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" Mar 8 12:33:25.373811: | decode_to_chunk: output: Mar 8 12:33:25.373840: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 Mar 8 12:33:25.373912: | do_aes_ctr: enter Mar 8 12:33:25.373968: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Mar 8 12:33:25.374000: | do_aes_ctr: exit Mar 8 12:33:25.374055: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.374090: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.374116: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key passed Mar 8 12:33:25.374188: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key Mar 8 12:33:25.374218: | decode_to_chunk: raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" Mar 8 12:33:25.374248: | decode_to_chunk: output: Mar 8 12:33:25.374272: | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 Mar 8 12:33:25.374294: | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 Mar 8 12:33:25.374350: | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" Mar 8 12:33:25.374428: | decode_to_chunk: output: Mar 8 12:33:25.374463: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 Mar 8 12:33:25.374509: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Mar 8 12:33:25.374583: | decode_to_chunk: output: Mar 8 12:33:25.374617: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.374661: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.374715: | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" Mar 8 12:33:25.374747: | decode_to_chunk: output: Mar 8 12:33:25.374817: | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 Mar 8 12:33:25.374856: | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c Mar 8 12:33:25.374885: | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" Mar 8 12:33:25.374910: | decode_to_chunk: output: Mar 8 12:33:25.374934: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 Mar 8 12:33:25.375018: | do_aes_ctr: enter Mar 8 12:33:25.375058: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Mar 8 12:33:25.375089: | do_aes_ctr: exit Mar 8 12:33:25.375169: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.375205: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.375230: | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" Mar 8 12:33:25.375260: | decode_to_chunk: output: Mar 8 12:33:25.375285: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 Mar 8 12:33:25.375323: | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" Mar 8 12:33:25.375385: | decode_to_chunk: output: Mar 8 12:33:25.375419: | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 Mar 8 12:33:25.375443: | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c Mar 8 12:33:25.375472: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Mar 8 12:33:25.375540: | decode_to_chunk: output: Mar 8 12:33:25.375575: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.375599: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.375628: | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" Mar 8 12:33:25.375696: | decode_to_chunk: output: Mar 8 12:33:25.375731: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 Mar 8 12:33:25.375755: | do_aes_ctr: enter Mar 8 12:33:25.375790: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Mar 8 12:33:25.375830: | do_aes_ctr: exit Mar 8 12:33:25.375894: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.375929: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.375956: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key passed Mar 8 12:33:25.376057: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key Mar 8 12:33:25.376092: | decode_to_chunk: raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" Mar 8 12:33:25.376117: | decode_to_chunk: output: Mar 8 12:33:25.376146: | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 Mar 8 12:33:25.376227: | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d Mar 8 12:33:25.376282: | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" Mar 8 12:33:25.376364: | decode_to_chunk: output: Mar 8 12:33:25.376396: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 Mar 8 12:33:25.376457: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Mar 8 12:33:25.376518: | decode_to_chunk: output: Mar 8 12:33:25.376584: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.376619: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.376643: | 20 21 22 23 Mar 8 12:33:25.376684: | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" Mar 8 12:33:25.376712: | decode_to_chunk: output: Mar 8 12:33:25.376783: | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa Mar 8 12:33:25.376815: | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f Mar 8 12:33:25.376845: | 1e c0 e6 b8 Mar 8 12:33:25.376881: | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" Mar 8 12:33:25.376908: | decode_to_chunk: output: Mar 8 12:33:25.376931: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 Mar 8 12:33:25.376988: | do_aes_ctr: enter Mar 8 12:33:25.377030: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Mar 8 12:33:25.377111: | do_aes_ctr: exit Mar 8 12:33:25.377146: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.377176: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.377201: | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" Mar 8 12:33:25.377238: | decode_to_chunk: output: Mar 8 12:33:25.377305: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 Mar 8 12:33:25.377340: | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" Mar 8 12:33:25.377371: | decode_to_chunk: output: Mar 8 12:33:25.377439: | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa Mar 8 12:33:25.377491: | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f Mar 8 12:33:25.377517: | 1e c0 e6 b8 Mar 8 12:33:25.377583: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Mar 8 12:33:25.377624: | decode_to_chunk: output: Mar 8 12:33:25.377653: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.377702: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.377762: | 20 21 22 23 Mar 8 12:33:25.377796: | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" Mar 8 12:33:25.377822: | decode_to_chunk: output: Mar 8 12:33:25.377851: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 Mar 8 12:33:25.377919: | do_aes_ctr: enter Mar 8 12:33:25.377973: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Mar 8 12:33:25.377998: | do_aes_ctr: exit Mar 8 12:33:25.378058: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.378105: | verify_chunk_data: counter-block: ok Mar 8 12:33:25.378174: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key passed Mar 8 12:33:25.378216: | test_cbc_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Mar 8 12:33:25.378247: | decode_to_chunk: raw_key: input "0x06a9214036b8a15b512e03d534120006" Mar 8 12:33:25.378330: | decode_to_chunk: output: Mar 8 12:33:25.378366: | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 Mar 8 12:33:25.378426: | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" Mar 8 12:33:25.378505: | decode_to_chunk: output: Mar 8 12:33:25.378542: | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 Mar 8 12:33:25.378568: | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" Mar 8 12:33:25.378637: | decode_to_chunk: output: Mar 8 12:33:25.378672: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a Mar 8 12:33:25.378696: | decode_to_chunk: plaintext: : input "Single block msg" Mar 8 12:33:25.378761: | decode_to_chunk: output: Mar 8 12:33:25.378808: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Mar 8 12:33:25.378834: | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" Mar 8 12:33:25.378895: | decode_to_chunk: output: Mar 8 12:33:25.378939: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a Mar 8 12:33:25.378966: | NSS ike_alg_nss_cbc: aes - enter Mar 8 12:33:25.379054: | NSS ike_alg_nss_cbc: aes - exit Mar 8 12:33:25.379145: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.379188: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.379243: | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" Mar 8 12:33:25.379291: | decode_to_chunk: output: Mar 8 12:33:25.379362: | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 Mar 8 12:33:25.379397: | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" Mar 8 12:33:25.379439: | decode_to_chunk: output: Mar 8 12:33:25.379499: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a Mar 8 12:33:25.379534: | decode_to_chunk: cipertext: : input "0xe353779c1079aeb82708942dbe77181a" Mar 8 12:33:25.379588: | decode_to_chunk: output: Mar 8 12:33:25.379654: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a Mar 8 12:33:25.379736: | decode_to_chunk: plaintext: : input "Single block msg" Mar 8 12:33:25.379770: | decode_to_chunk: output: Mar 8 12:33:25.379799: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Mar 8 12:33:25.379874: | NSS ike_alg_nss_cbc: aes - enter Mar 8 12:33:25.379921: | NSS ike_alg_nss_cbc: aes - exit Mar 8 12:33:25.380010: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.380084: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.380121: | test_ctr_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key passed Mar 8 12:33:25.380190: | test_cbc_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Mar 8 12:33:25.380225: | decode_to_chunk: raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" Mar 8 12:33:25.380254: | decode_to_chunk: output: Mar 8 12:33:25.380323: | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a Mar 8 12:33:25.380394: | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" Mar 8 12:33:25.380458: | decode_to_chunk: output: Mar 8 12:33:25.380534: | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 Mar 8 12:33:25.380569: | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" Mar 8 12:33:25.380600: | decode_to_chunk: output: Mar 8 12:33:25.380679: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a Mar 8 12:33:25.380714: | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 Mar 8 12:33:25.380784: | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" Mar 8 12:33:25.380822: | decode_to_chunk: output: Mar 8 12:33:25.380863: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.380924: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.380973: | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" Mar 8 12:33:25.381055: | decode_to_chunk: output: Mar 8 12:33:25.381102: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a Mar 8 12:33:25.381127: | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 Mar 8 12:33:25.381153: | NSS ike_alg_nss_cbc: aes - enter Mar 8 12:33:25.381196: | NSS ike_alg_nss_cbc: aes - exit Mar 8 12:33:25.381256: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.381291: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.381374: | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" Mar 8 12:33:25.381411: | decode_to_chunk: output: Mar 8 12:33:25.381482: | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 Mar 8 12:33:25.381523: | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" Mar 8 12:33:25.381568: | decode_to_chunk: output: Mar 8 12:33:25.381593: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a Mar 8 12:33:25.381616: | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 Mar 8 12:33:25.381691: | decode_to_chunk: cipertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" Mar 8 12:33:25.381727: | decode_to_chunk: output: Mar 8 12:33:25.381801: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a Mar 8 12:33:25.381836: | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 Mar 8 12:33:25.381869: | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" Mar 8 12:33:25.381895: | decode_to_chunk: output: Mar 8 12:33:25.381919: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.381987: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.382021: | NSS ike_alg_nss_cbc: aes - enter Mar 8 12:33:25.382059: | NSS ike_alg_nss_cbc: aes - exit Mar 8 12:33:25.382133: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.382168: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.382201: | test_ctr_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key passed Mar 8 12:33:25.382272: | test_cbc_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Mar 8 12:33:25.382304: | decode_to_chunk: raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" Mar 8 12:33:25.382336: | decode_to_chunk: output: Mar 8 12:33:25.382360: | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd Mar 8 12:33:25.382427: | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" Mar 8 12:33:25.382505: | decode_to_chunk: output: Mar 8 12:33:25.382586: | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 Mar 8 12:33:25.382622: | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" Mar 8 12:33:25.382684: | decode_to_chunk: output: Mar 8 12:33:25.382719: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 Mar 8 12:33:25.382748: | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 Mar 8 12:33:25.382802: | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 Mar 8 12:33:25.382837: | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" Mar 8 12:33:25.382867: | decode_to_chunk: output: Mar 8 12:33:25.382957: | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 Mar 8 12:33:25.382999: | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 Mar 8 12:33:25.383072: | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 Mar 8 12:33:25.383107: | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" Mar 8 12:33:25.383151: | decode_to_chunk: output: Mar 8 12:33:25.383214: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 Mar 8 12:33:25.383306: | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 Mar 8 12:33:25.383341: | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 Mar 8 12:33:25.383380: | NSS ike_alg_nss_cbc: aes - enter Mar 8 12:33:25.383413: | NSS ike_alg_nss_cbc: aes - exit Mar 8 12:33:25.383438: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.383461: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.383537: | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" Mar 8 12:33:25.383572: | decode_to_chunk: output: Mar 8 12:33:25.383619: | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 Mar 8 12:33:25.383644: | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" Mar 8 12:33:25.383715: | decode_to_chunk: output: Mar 8 12:33:25.383750: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 Mar 8 12:33:25.383779: | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 Mar 8 12:33:25.383803: | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 Mar 8 12:33:25.383841: | decode_to_chunk: cipertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" Mar 8 12:33:25.383902: | decode_to_chunk: output: Mar 8 12:33:25.383937: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 Mar 8 12:33:25.383978: | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 Mar 8 12:33:25.384042: | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 Mar 8 12:33:25.384076: | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" Mar 8 12:33:25.384105: | decode_to_chunk: output: Mar 8 12:33:25.384129: | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 Mar 8 12:33:25.384151: | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 Mar 8 12:33:25.384230: | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 Mar 8 12:33:25.384265: | NSS ike_alg_nss_cbc: aes - enter Mar 8 12:33:25.384302: | NSS ike_alg_nss_cbc: aes - exit Mar 8 12:33:25.384375: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.384411: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.384473: | test_ctr_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key passed Mar 8 12:33:25.384536: | test_cbc_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Mar 8 12:33:25.384566: | decode_to_chunk: raw_key: input "0x56e47a38c5598974bc46903dba290349" Mar 8 12:33:25.384624: | decode_to_chunk: output: Mar 8 12:33:25.384657: | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 Mar 8 12:33:25.384732: | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" Mar 8 12:33:25.384806: | decode_to_chunk: output: Mar 8 12:33:25.384877: | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 Mar 8 12:33:25.384970: | decode_to_chunk: new IV: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" Mar 8 12:33:25.385019: | decode_to_chunk: output: Mar 8 12:33:25.385043: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa Mar 8 12:33:25.385072: | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e Mar 8 12:33:25.385110: | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad Mar 8 12:33:25.385149: | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 Mar 8 12:33:25.385210: | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" Mar 8 12:33:25.385247: | decode_to_chunk: output: Mar 8 12:33:25.385276: | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af Mar 8 12:33:25.385358: | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf Mar 8 12:33:25.385391: | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf Mar 8 12:33:25.385420: | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df Mar 8 12:33:25.385443: | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" Mar 8 12:33:25.385531: | decode_to_chunk: output: Mar 8 12:33:25.385567: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa Mar 8 12:33:25.385624: | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e Mar 8 12:33:25.385681: | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad Mar 8 12:33:25.385714: | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 Mar 8 12:33:25.385777: | NSS ike_alg_nss_cbc: aes - enter Mar 8 12:33:25.385838: | NSS ike_alg_nss_cbc: aes - exit Mar 8 12:33:25.385919: | verify_chunk_data: encrypt: ok Mar 8 12:33:25.385954: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.385979: | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" Mar 8 12:33:25.386041: | decode_to_chunk: output: Mar 8 12:33:25.386101: | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 Mar 8 12:33:25.386133: | decode_to_chunk: new IV: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" Mar 8 12:33:25.386191: | decode_to_chunk: output: Mar 8 12:33:25.386220: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa Mar 8 12:33:25.386257: | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e Mar 8 12:33:25.386320: | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad Mar 8 12:33:25.386353: | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 Mar 8 12:33:25.386377: | decode_to_chunk: cipertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" Mar 8 12:33:25.386447: | decode_to_chunk: output: Mar 8 12:33:25.386515: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa Mar 8 12:33:25.386559: | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e Mar 8 12:33:25.386634: | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad Mar 8 12:33:25.386664: | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 Mar 8 12:33:25.386696: | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" Mar 8 12:33:25.386722: | decode_to_chunk: output: Mar 8 12:33:25.386794: | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af Mar 8 12:33:25.386830: | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf Mar 8 12:33:25.386854: | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf Mar 8 12:33:25.386885: | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df Mar 8 12:33:25.386923: | NSS ike_alg_nss_cbc: aes - enter Mar 8 12:33:25.387010: | NSS ike_alg_nss_cbc: aes - exit Mar 8 12:33:25.387043: | verify_chunk_data: decrypt: ok Mar 8 12:33:25.387073: | verify_chunk_data: updated CBC IV: ok Mar 8 12:33:25.387113: | test_ctr_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key passed Mar 8 12:33:25.387175: | test_prf_vector: Test Case #1 : AES-XCBC-MAC-96 with 0-byte input Mar 8 12:33:25.387210: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" Mar 8 12:33:25.387240: | decode_to_chunk: output: Mar 8 12:33:25.387311: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.387347: | decode_to_chunk: test_prf_vector: input "" Mar 8 12:33:25.387378: | decode_to_chunk: output: Mar 8 12:33:25.387402: | Mar 8 12:33:25.387425: | decode_to_chunk: test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" Mar 8 12:33:25.387498: | decode_to_chunk: output: Mar 8 12:33:25.387533: | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 Mar 8 12:33:25.387563: | test_prf_vector PRF aes_xcbc init key-chunk@0x558b8d1c38f8 (length 16) Mar 8 12:33:25.387626: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1be608 Mar 8 12:33:25.387691: | test_prf_vector PRF aes_xcbc update test_prf_vector-chunk@0x558b8d1c3938 (length 0) Mar 8 12:33:25.387747: | test_prf_vector PRF aes_xcbc final-chunk ... Mar 8 12:33:25.387898: | test_prf_vector PRF aes_xcbc final-chunk@0x558b8d1c3258 (length 16) Mar 8 12:33:25.387972: | chunk output 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 Mar 8 12:33:25.388040: | verify_chunk_data: Test Case #1 : AES-XCBC-MAC-96 with 0-byte input: ok Mar 8 12:33:25.388161: | test_prf_vector PRF aes_xcbc init key symkey-key@0x558b8d1c1780 (size 16) Mar 8 12:33:25.388271: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1be608 Mar 8 12:33:25.388342: | test_prf_vector PRF aes_xcbc update test_prf_vector-key@(nil) (size 0) Mar 8 12:33:25.388429: | test_prf_vector PRF aes_xcbc final-key ... Mar 8 12:33:25.388585: | test_prf_vector PRF aes_xcbc final-key@0x558b8d1c4b70 (size 16) Mar 8 12:33:25.388690: | outputsymkey-key@0x558b8d1c4b70, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY Mar 8 12:33:25.388791: | verify_chunk_data: Test Case #1 : AES-XCBC-MAC-96 with 0-byte input: ok Mar 8 12:33:25.388877: | test_prf_vector: Test Case #1 : AES-XCBC-MAC-96 with 0-byte input passed Mar 8 12:33:25.388952: | test_prf_vector: Test Case #2 : AES-XCBC-MAC-96 with 3-byte input Mar 8 12:33:25.389030: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" Mar 8 12:33:25.389113: | decode_to_chunk: output: Mar 8 12:33:25.389178: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.389274: | decode_to_chunk: test_prf_vector: input "0x000102" Mar 8 12:33:25.389321: | decode_to_chunk: output: Mar 8 12:33:25.389353: | 00 01 02 Mar 8 12:33:25.389412: | decode_to_chunk: test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" Mar 8 12:33:25.389472: | decode_to_chunk: output: Mar 8 12:33:25.389565: | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f Mar 8 12:33:25.389610: | test_prf_vector PRF aes_xcbc init key-chunk@0x558b8d1c3938 (length 16) Mar 8 12:33:25.389662: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1be608 Mar 8 12:33:25.389752: | test_prf_vector PRF aes_xcbc update test_prf_vector-chunk@0x558b8d1c3218 (length 3) Mar 8 12:33:25.389841: | test_prf_vector PRF aes_xcbc final-chunk ... Mar 8 12:33:25.389964: | test_prf_vector PRF aes_xcbc final-chunk@0x558b8d1c6448 (length 16) Mar 8 12:33:25.390059: | chunk output 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f Mar 8 12:33:25.390146: | verify_chunk_data: Test Case #2 : AES-XCBC-MAC-96 with 3-byte input: ok Mar 8 12:33:25.390214: | test_prf_vector PRF aes_xcbc init key symkey-key@0x558b8d1c4b70 (size 16) Mar 8 12:33:25.390308: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1be608 Mar 8 12:33:25.390395: | test_prf_vector PRF aes_xcbc update test_prf_vector-key@0x558b8d1bff10 (size 3) Mar 8 12:33:25.390499: | test_prf_vector PRF aes_xcbc final-key ... Mar 8 12:33:25.390669: | test_prf_vector PRF aes_xcbc final-key@0x558b8d1c6460 (size 16) Mar 8 12:33:25.390764: | outputsymkey-key@0x558b8d1c6460, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY Mar 8 12:33:25.390858: | verify_chunk_data: Test Case #2 : AES-XCBC-MAC-96 with 3-byte input: ok Mar 8 12:33:25.390930: | test_prf_vector: Test Case #2 : AES-XCBC-MAC-96 with 3-byte input passed Mar 8 12:33:25.391019: | test_prf_vector: Test Case #3 : AES-XCBC-MAC-96 with 16-byte input Mar 8 12:33:25.391087: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" Mar 8 12:33:25.391133: | decode_to_chunk: output: Mar 8 12:33:25.391203: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.391238: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" Mar 8 12:33:25.391282: | decode_to_chunk: output: Mar 8 12:33:25.391319: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.391386: | decode_to_chunk: test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" Mar 8 12:33:25.391421: | decode_to_chunk: output: Mar 8 12:33:25.391449: | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 Mar 8 12:33:25.391490: | test_prf_vector PRF aes_xcbc init key-chunk@0x558b8d1c3218 (length 16) Mar 8 12:33:25.391575: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1be608 Mar 8 12:33:25.391655: | test_prf_vector PRF aes_xcbc update test_prf_vector-chunk@0x558b8d1c3198 (length 16) Mar 8 12:33:25.391708: | test_prf_vector PRF aes_xcbc final-chunk ... Mar 8 12:33:25.391769: | test_prf_vector PRF aes_xcbc final-chunk@0x558b8d1c38f8 (length 16) Mar 8 12:33:25.391848: | chunk output d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 Mar 8 12:33:25.391919: | verify_chunk_data: Test Case #3 : AES-XCBC-MAC-96 with 16-byte input: ok Mar 8 12:33:25.392027: | test_prf_vector PRF aes_xcbc init key symkey-key@0x558b8d1bff10 (size 16) Mar 8 12:33:25.392128: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1be608 Mar 8 12:33:25.392196: | test_prf_vector PRF aes_xcbc update test_prf_vector-key@0x558b8d1c6460 (size 16) Mar 8 12:33:25.392285: | test_prf_vector PRF aes_xcbc final-key ... Mar 8 12:33:25.392419: | test_prf_vector PRF aes_xcbc final-key@0x558b8d1c1780 (size 16) Mar 8 12:33:25.392497: | outputsymkey-key@0x558b8d1c1780, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY Mar 8 12:33:25.392608: | verify_chunk_data: Test Case #3 : AES-XCBC-MAC-96 with 16-byte input: ok Mar 8 12:33:25.392680: | test_prf_vector: Test Case #3 : AES-XCBC-MAC-96 with 16-byte input passed Mar 8 12:33:25.392754: | test_prf_vector: Test Case #4 : AES-XCBC-MAC-96 with 20-byte input Mar 8 12:33:25.392835: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" Mar 8 12:33:25.392920: | decode_to_chunk: output: Mar 8 12:33:25.392951: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.393022: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" Mar 8 12:33:25.393064: | decode_to_chunk: output: Mar 8 12:33:25.393107: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.393143: | 10 11 12 13 Mar 8 12:33:25.393212: | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" Mar 8 12:33:25.393244: | decode_to_chunk: output: Mar 8 12:33:25.393325: | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 Mar 8 12:33:25.393360: | test_prf_vector PRF aes_xcbc init key-chunk@0x558b8d1c3198 (length 16) Mar 8 12:33:25.393412: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1c3018 Mar 8 12:33:25.393499: | test_prf_vector PRF aes_xcbc update test_prf_vector-chunk@0x558b8d1be608 (length 20) Mar 8 12:33:25.393541: | test_prf_vector PRF aes_xcbc final-chunk ... Mar 8 12:33:25.393619: | test_prf_vector PRF aes_xcbc final-chunk@0x558b8d1c38f8 (length 16) Mar 8 12:33:25.393687: | chunk output 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 Mar 8 12:33:25.393743: | verify_chunk_data: Test Case #4 : AES-XCBC-MAC-96 with 20-byte input: ok Mar 8 12:33:25.393856: | test_prf_vector PRF aes_xcbc init key symkey-key@0x558b8d1c6460 (size 16) Mar 8 12:33:25.393933: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1c3018 Mar 8 12:33:25.394017: | test_prf_vector PRF aes_xcbc update test_prf_vector-key@0x558b8d1c1780 (size 20) Mar 8 12:33:25.394119: | test_prf_vector PRF aes_xcbc final-key ... Mar 8 12:33:25.394214: | test_prf_vector PRF aes_xcbc final-key@0x558b8d1c4b70 (size 16) Mar 8 12:33:25.394289: | outputsymkey-key@0x558b8d1c4b70, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY Mar 8 12:33:25.394396: | verify_chunk_data: Test Case #4 : AES-XCBC-MAC-96 with 20-byte input: ok Mar 8 12:33:25.394481: | test_prf_vector: Test Case #4 : AES-XCBC-MAC-96 with 20-byte input passed Mar 8 12:33:25.394562: | test_prf_vector: Test Case #5 : AES-XCBC-MAC-96 with 32-byte input Mar 8 12:33:25.394640: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" Mar 8 12:33:25.394695: | decode_to_chunk: output: Mar 8 12:33:25.394757: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.394803: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" Mar 8 12:33:25.394881: | decode_to_chunk: output: Mar 8 12:33:25.394913: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.394942: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.395019: | decode_to_chunk: test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" Mar 8 12:33:25.395066: | decode_to_chunk: output: Mar 8 12:33:25.395093: | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 Mar 8 12:33:25.395167: | test_prf_vector PRF aes_xcbc init key-chunk@0x558b8d1c3298 (length 16) Mar 8 12:33:25.395226: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1c3018 Mar 8 12:33:25.395291: | test_prf_vector PRF aes_xcbc update test_prf_vector-chunk@0x558b8d1be608 (length 32) Mar 8 12:33:25.395338: | test_prf_vector PRF aes_xcbc final-chunk ... Mar 8 12:33:25.395467: | test_prf_vector PRF aes_xcbc final-chunk@0x558b8d1c6408 (length 16) Mar 8 12:33:25.395540: | chunk output f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 Mar 8 12:33:25.395625: | verify_chunk_data: Test Case #5 : AES-XCBC-MAC-96 with 32-byte input: ok Mar 8 12:33:25.395716: | test_prf_vector PRF aes_xcbc init key symkey-key@0x558b8d1c1780 (size 16) Mar 8 12:33:25.395811: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1c3018 Mar 8 12:33:25.395908: | test_prf_vector PRF aes_xcbc update test_prf_vector-key@0x558b8d1c4b70 (size 32) Mar 8 12:33:25.396027: | test_prf_vector PRF aes_xcbc final-key ... Mar 8 12:33:25.396178: | test_prf_vector PRF aes_xcbc final-key@0x558b8d1bff10 (size 16) Mar 8 12:33:25.396260: | outputsymkey-key@0x558b8d1bff10, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY Mar 8 12:33:25.396343: | verify_chunk_data: Test Case #5 : AES-XCBC-MAC-96 with 32-byte input: ok Mar 8 12:33:25.396415: | test_prf_vector: Test Case #5 : AES-XCBC-MAC-96 with 32-byte input passed Mar 8 12:33:25.396466: | test_prf_vector: Test Case #6 : AES-XCBC-MAC-96 with 34-byte input Mar 8 12:33:25.396536: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" Mar 8 12:33:25.396567: | decode_to_chunk: output: Mar 8 12:33:25.396642: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.396688: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" Mar 8 12:33:25.396752: | decode_to_chunk: output: Mar 8 12:33:25.396798: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.396823: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Mar 8 12:33:25.396853: | 20 21 Mar 8 12:33:25.396890: | decode_to_chunk: test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" Mar 8 12:33:25.396965: | decode_to_chunk: output: Mar 8 12:33:25.396999: | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 Mar 8 12:33:25.397030: | test_prf_vector PRF aes_xcbc init key-chunk@0x558b8d1c3198 (length 16) Mar 8 12:33:25.397089: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1be608 Mar 8 12:33:25.397155: | test_prf_vector PRF aes_xcbc update test_prf_vector-chunk@0x558b8d1c4938 (length 34) Mar 8 12:33:25.397222: | test_prf_vector PRF aes_xcbc final-chunk ... Mar 8 12:33:25.397373: | test_prf_vector PRF aes_xcbc final-chunk@0x558b8d1c38f8 (length 16) Mar 8 12:33:25.397440: | chunk output be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 Mar 8 12:33:25.397539: | verify_chunk_data: Test Case #6 : AES-XCBC-MAC-96 with 34-byte input: ok Mar 8 12:33:25.397679: | test_prf_vector PRF aes_xcbc init key symkey-key@0x558b8d1c4b70 (size 16) Mar 8 12:33:25.397757: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1be608 Mar 8 12:33:25.397873: | test_prf_vector PRF aes_xcbc update test_prf_vector-key@0x558b8d1bff10 (size 34) Mar 8 12:33:25.397985: | test_prf_vector PRF aes_xcbc final-key ... Mar 8 12:33:25.398118: | test_prf_vector PRF aes_xcbc final-key@0x558b8d1c6460 (size 16) Mar 8 12:33:25.398195: | outputsymkey-key@0x558b8d1c6460, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY Mar 8 12:33:25.398277: | verify_chunk_data: Test Case #6 : AES-XCBC-MAC-96 with 34-byte input: ok Mar 8 12:33:25.398361: | test_prf_vector: Test Case #6 : AES-XCBC-MAC-96 with 34-byte input passed Mar 8 12:33:25.398447: | test_prf_vector: Test Case #7 : AES-XCBC-MAC-96 with 1000-byte input Mar 8 12:33:25.398527: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" Mar 8 12:33:25.398599: | decode_to_chunk: output: Mar 8 12:33:25.398679: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.398749: | decode_to_chunk: test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" Mar 8 12:33:25.398809: | decode_to_chunk: output: Mar 8 12:33:25.398877: | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f Mar 8 12:33:25.398921: | test_prf_vector PRF aes_xcbc init key-chunk@0x558b8d1c3218 (length 16) Mar 8 12:33:25.398979: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1be608 Mar 8 12:33:25.399065: | test_prf_vector PRF aes_xcbc update test_prf_vector-chunk@0x558b8d1c95f8 (length 1000) Mar 8 12:33:25.399103: | test_prf_vector PRF aes_xcbc final-chunk ... Mar 8 12:33:25.399279: | test_prf_vector PRF aes_xcbc final-chunk@0x558b8d1c6408 (length 16) Mar 8 12:33:25.399362: | chunk output f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f Mar 8 12:33:25.399416: | verify_chunk_data: Test Case #7 : AES-XCBC-MAC-96 with 1000-byte input: ok Mar 8 12:33:25.399506: | test_prf_vector PRF aes_xcbc init key symkey-key@0x558b8d1bff10 (size 16) Mar 8 12:33:25.399604: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1be608 Mar 8 12:33:25.399709: | test_prf_vector PRF aes_xcbc update test_prf_vector-key@0x558b8d1c6460 (size 1000) Mar 8 12:33:25.399804: | test_prf_vector PRF aes_xcbc final-key ... Mar 8 12:33:25.399991: | test_prf_vector PRF aes_xcbc final-key@0x558b8d1c1780 (size 16) Mar 8 12:33:25.400085: | outputsymkey-key@0x558b8d1c1780, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY Mar 8 12:33:25.400185: | verify_chunk_data: Test Case #7 : AES-XCBC-MAC-96 with 1000-byte input: ok Mar 8 12:33:25.400267: | test_prf_vector: Test Case #7 : AES-XCBC-MAC-96 with 1000-byte input passed Mar 8 12:33:25.400341: | test_prf_vector: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Mar 8 12:33:25.400410: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" Mar 8 12:33:25.400485: | decode_to_chunk: output: Mar 8 12:33:25.400558: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.400628: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" Mar 8 12:33:25.400701: | decode_to_chunk: output: Mar 8 12:33:25.400798: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.400864: | 10 11 12 13 Mar 8 12:33:25.400917: | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" Mar 8 12:33:25.401012: | decode_to_chunk: output: Mar 8 12:33:25.401090: | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 Mar 8 12:33:25.401169: | test_prf_vector PRF aes_xcbc init key-chunk@0x558b8d1c6448 (length 16) Mar 8 12:33:25.401271: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1c3018 Mar 8 12:33:25.401352: | test_prf_vector PRF aes_xcbc update test_prf_vector-chunk@0x558b8d1be608 (length 20) Mar 8 12:33:25.401414: | test_prf_vector PRF aes_xcbc final-chunk ... Mar 8 12:33:25.401505: | test_prf_vector PRF aes_xcbc final-chunk@0x558b8d1c38f8 (length 16) Mar 8 12:33:25.401593: | chunk output 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 Mar 8 12:33:25.401649: | verify_chunk_data: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok Mar 8 12:33:25.401753: | test_prf_vector PRF aes_xcbc init key symkey-key@0x558b8d1c6460 (size 16) Mar 8 12:33:25.401843: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1c3018 Mar 8 12:33:25.401952: | test_prf_vector PRF aes_xcbc update test_prf_vector-key@0x558b8d1c1780 (size 20) Mar 8 12:33:25.402054: | test_prf_vector PRF aes_xcbc final-key ... Mar 8 12:33:25.402189: | test_prf_vector PRF aes_xcbc final-key@0x558b8d1c4b70 (size 16) Mar 8 12:33:25.402269: | outputsymkey-key@0x558b8d1c4b70, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY Mar 8 12:33:25.402343: | verify_chunk_data: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok Mar 8 12:33:25.402420: | test_prf_vector: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) passed Mar 8 12:33:25.402480: | test_prf_vector: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Mar 8 12:33:25.402567: | decode_to_chunk: test_prf_vector: input "0x00010203040506070809" Mar 8 12:33:25.402638: | decode_to_chunk: output: Mar 8 12:33:25.402700: | 00 01 02 03 04 05 06 07 08 09 Mar 8 12:33:25.402739: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" Mar 8 12:33:25.402780: | decode_to_chunk: output: Mar 8 12:33:25.402842: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.402878: | 10 11 12 13 Mar 8 12:33:25.402906: | decode_to_chunk: test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" Mar 8 12:33:25.402965: | decode_to_chunk: output: Mar 8 12:33:25.402999: | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 Mar 8 12:33:25.403041: | test_prf_vector PRF aes_xcbc init key-chunk@0x558b8d1c3218 (length 10) Mar 8 12:33:25.403117: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1c3018 Mar 8 12:33:25.403195: | test_prf_vector PRF aes_xcbc update test_prf_vector-chunk@0x558b8d1be608 (length 20) Mar 8 12:33:25.403265: | test_prf_vector PRF aes_xcbc final-chunk ... Mar 8 12:33:25.403390: | test_prf_vector PRF aes_xcbc final-chunk@0x558b8d1c6408 (length 16) Mar 8 12:33:25.403484: | chunk output 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 Mar 8 12:33:25.403564: | verify_chunk_data: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok Mar 8 12:33:25.403657: | test_prf_vector PRF aes_xcbc init key symkey-key@0x558b8d1c4b70 (size 10) Mar 8 12:33:25.403754: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1c3018 Mar 8 12:33:25.403858: | test_prf_vector PRF aes_xcbc update test_prf_vector-key@0x558b8d1c6460 (size 20) Mar 8 12:33:25.403965: | test_prf_vector PRF aes_xcbc final-key ... Mar 8 12:33:25.404086: | test_prf_vector PRF aes_xcbc final-key@0x558b8d1bff10 (size 16) Mar 8 12:33:25.404159: | outputsymkey-key@0x558b8d1bff10, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY Mar 8 12:33:25.404242: | verify_chunk_data: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok Mar 8 12:33:25.404301: | test_prf_vector: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) passed Mar 8 12:33:25.404405: | test_prf_vector: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Mar 8 12:33:25.404442: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" Mar 8 12:33:25.404553: | decode_to_chunk: output: Mar 8 12:33:25.404589: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.404627: | ed cb Mar 8 12:33:25.404662: | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" Mar 8 12:33:25.404691: | decode_to_chunk: output: Mar 8 12:33:25.404715: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Mar 8 12:33:25.404738: | 10 11 12 13 Mar 8 12:33:25.404808: | decode_to_chunk: test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" Mar 8 12:33:25.404840: | decode_to_chunk: output: Mar 8 12:33:25.404871: | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 Mar 8 12:33:25.404895: | test_prf_vector PRF aes_xcbc init key-chunk@0x558b8d1be608 (length 18) Mar 8 12:33:25.404994: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1c30b8 Mar 8 12:33:25.405076: | test_prf_vector PRF aes_xcbc update test_prf_vector-chunk@0x558b8d1c3018 (length 20) Mar 8 12:33:25.405146: | test_prf_vector PRF aes_xcbc final-chunk ... Mar 8 12:33:25.405254: | test_prf_vector PRF aes_xcbc final-chunk@0x558b8d1c3218 (length 16) Mar 8 12:33:25.405342: | chunk output 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 Mar 8 12:33:25.405395: | verify_chunk_data: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): ok Mar 8 12:33:25.405524: | test_prf_vector PRF aes_xcbc init key symkey-key@0x558b8d1bff10 (size 18) Mar 8 12:33:25.405705: | test_prf_vector PRF aes_xcbc crypt-prf@0x558b8d1c3068 Mar 8 12:33:25.405811: | test_prf_vector PRF aes_xcbc update test_prf_vector-key@0x558b8d1c7cd0 (size 20) Mar 8 12:33:25.405912: | test_prf_vector PRF aes_xcbc final-key ... Mar 8 12:33:25.406058: | test_prf_vector PRF aes_xcbc final-key@0x558b8d1c9540 (size 16) Mar 8 12:33:25.406132: | outputsymkey-key@0x558b8d1c9540, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY Mar 8 12:33:25.406227: | verify_chunk_data: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): ok Mar 8 12:33:25.406323: | test_prf_vector: Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) passed Mar 8 12:33:25.406449: starting up 2 crypto helpers Mar 8 12:33:25.406586: started thread for crypto helper 0 Mar 8 12:33:25.406710: started thread for crypto helper 1 Mar 8 12:33:25.406805: | ignoring microcode for XAUTH_I1 (timeout: EVENT_v1_RETRANSMIT flags: 0) -> MAIN_I4 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_v1_RETRANSMIT Mar 8 12:33:25.406876: | MAIN_R0 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.406944: | MAIN_I1 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.407024: | MAIN_R1 (timeout: EVENT_SO_DISCARD flags: 200) Mar 8 12:33:25.407104: | MAIN_I2 (timeout: EVENT_v1_RETRANSMIT flags: 0) Mar 8 12:33:25.407182: | MAIN_R2 (timeout: EVENT_v1_RETRANSMIT flags: 0) Mar 8 12:33:25.407265: | MAIN_I3 (timeout: EVENT_v1_RETRANSMIT flags: 0) Mar 8 12:33:25.407347: | MAIN_R3 (timeout: EVENT_SA_REPLACE flags: 200) Mar 8 12:33:25.407384: | MAIN_I4 (timeout: EVENT_SA_REPLACE flags: 0) Mar 8 12:33:25.407422: | AGGR_R0 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.407448: | AGGR_I1 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.407484: | AGGR_R1 (timeout: EVENT_SO_DISCARD flags: 200) Mar 8 12:33:25.407509: | AGGR_I2 (timeout: EVENT_SA_REPLACE flags: 200) Mar 8 12:33:25.407577: | AGGR_R2 (timeout: EVENT_SA_REPLACE flags: 0) Mar 8 12:33:25.407613: | QUICK_R0 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.407655: | QUICK_I1 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.407681: | QUICK_R1 (timeout: EVENT_v1_RETRANSMIT flags: 0) Mar 8 12:33:25.407705: | QUICK_I2 (timeout: EVENT_SA_REPLACE flags: 200) Mar 8 12:33:25.407762: | QUICK_R2 (timeout: EVENT_SA_REPLACE flags: 0) Mar 8 12:33:25.407797: | INFO (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.407826: | INFO_PROTECTED (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.407862: | XAUTH_R0 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.407923: | XAUTH_R1 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.407958: | MODE_CFG_R0 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.408017: | MODE_CFG_R1 (timeout: EVENT_SA_REPLACE flags: 0) Mar 8 12:33:25.408051: | MODE_CFG_R2 (timeout: EVENT_SA_REPLACE flags: 0) Mar 8 12:33:25.408094: | MODE_CFG_I1 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.408120: | XAUTH_I0 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.408177: | XAUTH_I1 (timeout: EVENT_v1_RETRANSMIT flags: 0) Mar 8 12:33:25.408214: | Processing IKEv2 state V2_REKEY_IKE_I0 (microcode Initiate CREATE_CHILD_SA IKE Rekey) Mar 8 12:33:25.408244: | Processing IKEv2 state V2_REKEY_CHILD_I0 (microcode Initiate CREATE_CHILD_SA IPsec Rekey SA) Mar 8 12:33:25.408307: | Processing IKEv2 state V2_CREATE_I0 (microcode Initiate CREATE_CHILD_SA IPsec SA) Mar 8 12:33:25.408342: | Processing IKEv2 state PARENT_I0 (microcode initiate IKE_SA_INIT) Mar 8 12:33:25.408367: | Processing IKEv2 state PARENT_I1 (microcode Initiator: process SA_INIT reply notification) Mar 8 12:33:25.408411: | Processing IKEv2 state PARENT_I2 (microcode Initiator: process INVALID_SYNTAX AUTH notification) Mar 8 12:33:25.408471: | Processing IKEv2 state PARENT_R0 (microcode Respond to IKE_SA_INIT) Mar 8 12:33:25.408501: | Processing IKEv2 state PARENT_R1 (microcode Responder: process AUTH request (no SKEYSEED)) Mar 8 12:33:25.408531: | Processing IKEv2 state V2_REKEY_IKE_R (microcode Respond to CREATE_CHILD_SA IKE Rekey) Mar 8 12:33:25.408560: | Processing IKEv2 state V2_REKEY_IKE_I (microcode Process CREATE_CHILD_SA IKE Rekey Response) Mar 8 12:33:25.408631: | Processing IKEv2 state V2_CREATE_I (microcode Process CREATE_CHILD_SA IPsec SA Response) Mar 8 12:33:25.408667: | Processing IKEv2 state V2_CREATE_R (microcode Respond to CREATE_CHILD_SA IPsec SA Request) Mar 8 12:33:25.408696: | Processing IKEv2 state PARENT_I3 (microcode I3: INFORMATIONAL Request) Mar 8 12:33:25.408721: | Processing IKEv2 state PARENT_R2 (microcode R2: process INFORMATIONAL Request) Mar 8 12:33:25.408745: | Processing IKEv2 state IKESA_DEL (microcode IKE_SA_DEL: process INFORMATIONAL) Mar 8 12:33:25.408823: | ignoring microcode for PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_RETAIN Mar 8 12:33:25.408867: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL Mar 8 12:33:25.408899: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL Mar 8 12:33:25.408970: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL Mar 8 12:33:25.409007: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL Mar 8 12:33:25.409038: | ignoring microcode for PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0) -> PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0) with event EVENT_SA_REPLACE Mar 8 12:33:25.409113: | ignoring microcode for PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN Mar 8 12:33:25.409151: | ignoring microcode for PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN Mar 8 12:33:25.409177: | ignoring microcode for PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN Mar 8 12:33:25.409202: | ignoring microcode for PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN Mar 8 12:33:25.409273: | IKEv2_BASE (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.409310: | PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0) Mar 8 12:33:25.409339: | PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) Mar 8 12:33:25.409375: | PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) Mar 8 12:33:25.409436: | PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0) Mar 8 12:33:25.409498: | PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) Mar 8 12:33:25.409526: | V2_CREATE_I0 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.409598: | V2_CREATE_I (timeout: EVENT_v2_RETRANSMIT flags: 0) Mar 8 12:33:25.409634: | V2_REKEY_IKE_I0 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.409664: | V2_REKEY_IKE_I (timeout: EVENT_v2_RETRANSMIT flags: 0) Mar 8 12:33:25.409734: | V2_REKEY_CHILD_I0 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.409770: | V2_REKEY_CHILD_I (timeout: EVENT_v2_RETRANSMIT flags: 0) Mar 8 12:33:25.409796: | V2_CREATE_R (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.409820: | V2_REKEY_IKE_R (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.409843: | V2_REKEY_CHILD_R (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.409909: | V2_IPSEC_I (timeout: EVENT_SA_REPLACE flags: 0) Mar 8 12:33:25.409944: | V2_IPSEC_R (timeout: EVENT_SA_REPLACE flags: 0) Mar 8 12:33:25.409968: | IKESA_DEL (timeout: EVENT_RETAIN flags: 0) Mar 8 12:33:25.409998: | CHILDSA_DEL (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.410070: | PARENT_R0 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.410106: | PARENT_I0 (timeout: EVENT_NULL flags: 0) Mar 8 12:33:25.410158: Using Linux XFRM/NETKEY IPsec interface code on 4.14.219-161.340.amzn2.x86_64 Mar 8 12:33:25.410272: | process 10188 listening for PF_KEY_V2 on file descriptor 14 Mar 8 12:33:25.410353: | kernel_alg_init() Mar 8 12:33:25.410432: | Hard-wiring new AEAD algorithms Mar 8 12:33:25.410501: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=18(ESP_AES_GCM_A), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.410584: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=19(ESP_AES_GCM_B), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.410620: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=20(ESP_AES_GCM_C), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.410704: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=14(ESP_AES_CCM_A), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.410741: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=15(ESP_AES_CCM_B), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.410774: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=16(ESP_AES_CCM_C), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.410815: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=23(ESP_NULL_AUTH_AES_GMAC), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.410887: | Hard-wiring new INTEG algorithms Mar 8 12:33:25.410970: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=250(AH_AES_CMAC_96), alg_ivlen=0, alg_minbits=128, alg_maxbits=128 Mar 8 12:33:25.411507: | finish_pfkey_msg: K_SADB_REGISTER message 1 for AH Mar 8 12:33:25.411576: | 02 07 00 02 02 00 00 00 01 00 00 00 cc 27 00 00 Mar 8 12:33:25.411745: | starting up helper thread 1 Mar 8 12:33:25.411798: | status value returned by setting the priority of this thread (crypto helper 1) 22 Mar 8 12:33:25.411824: | crypto helper 1 waiting (nothing to do) Mar 8 12:33:25.412775: | starting up helper thread 0 Mar 8 12:33:25.412811: | status value returned by setting the priority of this thread (crypto helper 0) 22 Mar 8 12:33:25.412842: | crypto helper 0 waiting (nothing to do) Mar 8 12:33:25.415015: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 1 for process 0 Mar 8 12:33:25.415031: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 2 for process 0 Mar 8 12:33:25.415037: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 3 for process 0 Mar 8 12:33:25.415043: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 4 for process 0 Mar 8 12:33:25.415048: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 5 for process 0 Mar 8 12:33:25.415053: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 6 for process 0 Mar 8 12:33:25.415058: | pfkey_get: K_SADB_REGISTER message 1 Mar 8 12:33:25.415062: | kernel_alg_register_pfkey(): SADB_SATYPE_AH: sadb_msg_len=22 sadb_supported_len=72 Mar 8 12:33:25.415067: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=251(AH_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0 Mar 8 12:33:25.415072: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=2(AH_MD5), alg_ivlen=0, alg_minbits=128, alg_maxbits=128 Mar 8 12:33:25.415075: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=3(AH_SHA), alg_ivlen=0, alg_minbits=160, alg_maxbits=160 Mar 8 12:33:25.415079: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=5(AH_SHA2_256), alg_ivlen=0, alg_minbits=256, alg_maxbits=256 Mar 8 12:33:25.415083: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=6(AH_SHA2_384), alg_ivlen=0, alg_minbits=384, alg_maxbits=384 Mar 8 12:33:25.415087: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=7(AH_SHA2_512), alg_ivlen=0, alg_minbits=512, alg_maxbits=512 Mar 8 12:33:25.415090: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=8(AH_RIPEMD), alg_ivlen=0, alg_minbits=160, alg_maxbits=160 Mar 8 12:33:25.415094: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=9(AH_AES_XCBC_MAC), alg_ivlen=0, alg_minbits=128, alg_maxbits=128 Mar 8 12:33:25.415097: | kernel_alg_register_pfkey(): SADB_SATYPE_AH: sadb_msg_len=22 sadb_supported_len=88 Mar 8 12:33:25.415101: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=11(ESP_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0 Mar 8 12:33:25.415109: | kernel_alg_add(2,15,11) fails because alg combo is invalid Mar 8 12:33:25.415113: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=2(ESP_DES(UNUSED)), alg_ivlen=8, alg_minbits=64, alg_maxbits=64 Mar 8 12:33:25.415116: | kernel_alg_add(2,15,2) fails because alg combo is invalid Mar 8 12:33:25.415120: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=3(ESP_3DES), alg_ivlen=8, alg_minbits=192, alg_maxbits=192 Mar 8 12:33:25.415123: | kernel_alg_add(2,15,3) fails because alg combo is invalid Mar 8 12:33:25.415127: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=6(ESP_CAST), alg_ivlen=8, alg_minbits=40, alg_maxbits=128 Mar 8 12:33:25.415130: | kernel_alg_add(2,15,6) fails because alg combo is invalid Mar 8 12:33:25.415134: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=7(ESP_BLOWFISH(UNUSED)), alg_ivlen=8, alg_minbits=40, alg_maxbits=448 Mar 8 12:33:25.415137: | kernel_alg_add(2,15,7) fails because alg combo is invalid Mar 8 12:33:25.415141: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=12(ESP_AES), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.415144: | kernel_alg_add(2,15,12) fails because alg combo is invalid Mar 8 12:33:25.415148: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=252(ESP_SERPENT), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.415151: | kernel_alg_add(2,15,252) fails because alg combo is invalid Mar 8 12:33:25.415154: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=22(ESP_CAMELLIA), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.415158: | kernel_alg_add(2,15,22) fails because alg combo is invalid Mar 8 12:33:25.415161: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=253(ESP_TWOFISH), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.415165: | kernel_alg_add(2,15,253) fails because alg combo is invalid Mar 8 12:33:25.415168: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=13(ESP_AES_CTR), alg_ivlen=8, alg_minbits=160, alg_maxbits=288 Mar 8 12:33:25.415171: | kernel_alg_add(2,15,13) fails because alg combo is invalid Mar 8 12:33:25.415174: | AH registered with kernel. Mar 8 12:33:25.415179: | finish_pfkey_msg: K_SADB_REGISTER message 2 for ESP Mar 8 12:33:25.415182: | 02 07 00 03 02 00 00 00 02 00 00 00 cc 27 00 00 Mar 8 12:33:25.418137: | pfkey_get: K_SADB_REGISTER message 2 Mar 8 12:33:25.418152: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=22 sadb_supported_len=72 Mar 8 12:33:25.418158: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=251(AH_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0 Mar 8 12:33:25.418162: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=251 Mar 8 12:33:25.418166: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=2(AH_MD5), alg_ivlen=0, alg_minbits=128, alg_maxbits=128 Mar 8 12:33:25.418170: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=2 Mar 8 12:33:25.418173: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=3(AH_SHA), alg_ivlen=0, alg_minbits=160, alg_maxbits=160 Mar 8 12:33:25.418177: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=3 Mar 8 12:33:25.418180: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=5(AH_SHA2_256), alg_ivlen=0, alg_minbits=256, alg_maxbits=256 Mar 8 12:33:25.418184: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=5 Mar 8 12:33:25.418187: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=6(AH_SHA2_384), alg_ivlen=0, alg_minbits=384, alg_maxbits=384 Mar 8 12:33:25.418194: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=6 Mar 8 12:33:25.418198: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=7(AH_SHA2_512), alg_ivlen=0, alg_minbits=512, alg_maxbits=512 Mar 8 12:33:25.418201: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=7 Mar 8 12:33:25.418205: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=8(AH_RIPEMD), alg_ivlen=0, alg_minbits=160, alg_maxbits=160 Mar 8 12:33:25.418208: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=8 Mar 8 12:33:25.418211: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=9(AH_AES_XCBC_MAC), alg_ivlen=0, alg_minbits=128, alg_maxbits=128 Mar 8 12:33:25.418215: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=9 Mar 8 12:33:25.418218: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=22 sadb_supported_len=88 Mar 8 12:33:25.418222: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=11(ESP_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0 Mar 8 12:33:25.418226: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=2(ESP_DES(UNUSED)), alg_ivlen=8, alg_minbits=64, alg_maxbits=64 Mar 8 12:33:25.418229: | kernel_alg_add(): Ignoring alg_id=2(ESP_DES(UNUSED)) - too weak Mar 8 12:33:25.418233: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=3(ESP_3DES), alg_ivlen=8, alg_minbits=192, alg_maxbits=192 Mar 8 12:33:25.418237: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=6(ESP_CAST), alg_ivlen=8, alg_minbits=40, alg_maxbits=128 Mar 8 12:33:25.418240: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=7(ESP_BLOWFISH(UNUSED)), alg_ivlen=8, alg_minbits=40, alg_maxbits=448 Mar 8 12:33:25.418244: | kernel_alg_add(): Ignoring alg_id=7(ESP_BLOWFISH(UNUSED)) - too weak Mar 8 12:33:25.418247: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=12(ESP_AES), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.418251: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=252(ESP_SERPENT), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.418255: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=22(ESP_CAMELLIA), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.418259: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=253(ESP_TWOFISH), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Mar 8 12:33:25.418262: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=13(ESP_AES_CTR), alg_ivlen=8, alg_minbits=160, alg_maxbits=288 Mar 8 12:33:25.418266: | ESP registered with kernel. Mar 8 12:33:25.418270: | finish_pfkey_msg: K_SADB_REGISTER message 3 for IPCOMP Mar 8 12:33:25.418274: | 02 07 00 09 02 00 00 00 03 00 00 00 cc 27 00 00 Mar 8 12:33:25.421177: | pfkey_get: K_SADB_REGISTER message 3 Mar 8 12:33:25.421188: | IPCOMP registered with kernel. Mar 8 12:33:25.421197: | Registered AH, ESP and IPCOMP Mar 8 12:33:25.421202: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x558b8d1c3dd8 Mar 8 12:33:25.421208: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Mar 8 12:33:25.421216: | setup kernel fd callback Mar 8 12:33:25.421233: | vendor id hash md5 init Mar 8 12:33:25.421263: | vendor id hash md5 digest data-bytes@0x558b8b707b4b (length 11) Mar 8 12:33:25.421268: | vendor id hash md5 final bytes@0x558b8d1c38f8 (length 16) Mar 8 12:33:25.421274: | vendor id hash md5 init Mar 8 12:33:25.421279: | vendor id hash md5 digest data-bytes@0x558b8b707b57 (length 19) Mar 8 12:33:25.421283: | vendor id hash md5 final bytes@0x558b8d1c3218 (length 16) Mar 8 12:33:25.421290: | vendor id hash md5 init Mar 8 12:33:25.421295: | vendor id hash md5 digest data-bytes@0x558b8b7087a0 (length 39) Mar 8 12:33:25.421299: | vendor id hash md5 final bytes@0x558b8d1c31d8 (length 16) Mar 8 12:33:25.421302: | vendor id hash md5 init Mar 8 12:33:25.421307: | vendor id hash md5 digest data-bytes@0x558b8b707b6b (length 6) Mar 8 12:33:25.421310: | vendor id hash md5 final bytes@0x558b8d1c3938 (length 16) Mar 8 12:33:25.421314: | vendor id hash md5 init Mar 8 12:33:25.421318: | vendor id hash md5 digest data-bytes@0x558b8b707b72 (length 12) Mar 8 12:33:25.421322: | vendor id hash md5 final bytes@0x558b8d1c6408 (length 16) Mar 8 12:33:25.421325: | vendor id hash md5 init Mar 8 12:33:25.421330: | vendor id hash md5 digest data-bytes@0x558b8b707b7f (length 16) Mar 8 12:33:25.421333: | vendor id hash md5 final bytes@0x558b8d1c3258 (length 16) Mar 8 12:33:25.421337: | vendor id hash md5 init Mar 8 12:33:25.421341: | vendor id hash md5 digest data-bytes@0x558b8b707b90 (length 16) Mar 8 12:33:25.421344: | vendor id hash md5 final bytes@0x558b8d1c3198 (length 16) Mar 8 12:33:25.421349: | vendor id hash md5 init Mar 8 12:33:25.421353: | vendor id hash md5 digest data-bytes@0x558b8b707ba1 (length 16) Mar 8 12:33:25.421356: | vendor id hash md5 final bytes@0x558b8d1c9918 (length 16) Mar 8 12:33:25.421360: | vendor id hash md5 init Mar 8 12:33:25.421364: | vendor id hash md5 digest data-bytes@0x558b8b707bb2 (length 16) Mar 8 12:33:25.421368: | vendor id hash md5 final bytes@0x558b8d1c9958 (length 16) Mar 8 12:33:25.421372: | vendor id hash md5 init Mar 8 12:33:25.421376: | vendor id hash md5 digest data-bytes@0x558b8b707bc3 (length 18) Mar 8 12:33:25.421379: | vendor id hash md5 final bytes@0x558b8d1ce1b8 (length 16) Mar 8 12:33:25.421383: | vendor id hash md5 init Mar 8 12:33:25.421387: | vendor id hash md5 digest data-bytes@0x558b8b7087c8 (length 55) Mar 8 12:33:25.421391: | vendor id hash md5 final bytes@0x558b8d1ce1f8 (length 16) Mar 8 12:33:25.421395: | vendor id hash md5 init Mar 8 12:33:25.421399: | vendor id hash md5 digest data-bytes@0x558b8b708800 (length 55) Mar 8 12:33:25.421402: | vendor id hash md5 final bytes@0x558b8d1ce238 (length 16) Mar 8 12:33:25.421406: | vendor id hash md5 init Mar 8 12:33:25.421410: | vendor id hash md5 digest data-bytes@0x558b8b708838 (length 55) Mar 8 12:33:25.421414: | vendor id hash md5 final bytes@0x558b8d1ce278 (length 16) Mar 8 12:33:25.421417: | vendor id hash md5 init Mar 8 12:33:25.421422: | vendor id hash md5 digest data-bytes@0x558b8b708870 (length 55) Mar 8 12:33:25.421425: | vendor id hash md5 final bytes@0x558b8d1ce2b8 (length 16) Mar 8 12:33:25.421429: | vendor id hash md5 init Mar 8 12:33:25.421433: | vendor id hash md5 digest data-bytes@0x558b8b7088a8 (length 55) Mar 8 12:33:25.421436: | vendor id hash md5 final bytes@0x558b8d1ce2f8 (length 16) Mar 8 12:33:25.421440: | vendor id hash md5 init Mar 8 12:33:25.421446: | vendor id hash md5 digest data-bytes@0x558b8b7088e0 (length 55) Mar 8 12:33:25.421476: | vendor id hash md5 final bytes@0x558b8d1ce338 (length 16) Mar 8 12:33:25.421487: | vendor id hash md5 init Mar 8 12:33:25.421492: | vendor id hash md5 digest data-bytes@0x558b8b708918 (length 55) Mar 8 12:33:25.421496: | vendor id hash md5 final bytes@0x558b8d1ce378 (length 16) Mar 8 12:33:25.421500: | vendor id hash md5 init Mar 8 12:33:25.421504: | vendor id hash md5 digest data-bytes@0x558b8b708950 (length 55) Mar 8 12:33:25.421508: | vendor id hash md5 final bytes@0x558b8d1ce3b8 (length 16) Mar 8 12:33:25.421512: | vendor id hash md5 init Mar 8 12:33:25.421516: | vendor id hash md5 digest data-bytes@0x558b8b708988 (length 55) Mar 8 12:33:25.421519: | vendor id hash md5 final bytes@0x558b8d1ce3f8 (length 16) Mar 8 12:33:25.421523: | vendor id hash md5 init Mar 8 12:33:25.421527: | vendor id hash md5 digest data-bytes@0x558b8b7089c0 (length 55) Mar 8 12:33:25.421531: | vendor id hash md5 final bytes@0x558b8d1ce438 (length 16) Mar 8 12:33:25.421534: | vendor id hash md5 init Mar 8 12:33:25.421542: | vendor id hash md5 digest data-bytes@0x558b8b7089f8 (length 55) Mar 8 12:33:25.421545: | vendor id hash md5 final bytes@0x558b8d1ce478 (length 16) Mar 8 12:33:25.421549: | vendor id hash md5 init Mar 8 12:33:25.421553: | vendor id hash md5 digest data-bytes@0x558b8b708a30 (length 55) Mar 8 12:33:25.421557: | vendor id hash md5 final bytes@0x558b8d1ce4b8 (length 16) Mar 8 12:33:25.421561: | vendor id hash md5 init Mar 8 12:33:25.421565: | vendor id hash md5 digest data-bytes@0x558b8b708a68 (length 55) Mar 8 12:33:25.421568: | vendor id hash md5 final bytes@0x558b8d1ce4f8 (length 16) Mar 8 12:33:25.421572: | vendor id hash md5 init Mar 8 12:33:25.421577: | vendor id hash md5 digest data-bytes@0x558b8b708aa0 (length 55) Mar 8 12:33:25.421580: | vendor id hash md5 final bytes@0x558b8d1ce538 (length 16) Mar 8 12:33:25.421584: | vendor id hash md5 init Mar 8 12:33:25.421588: | vendor id hash md5 digest data-bytes@0x558b8b708ad8 (length 55) Mar 8 12:33:25.421592: | vendor id hash md5 final bytes@0x558b8d1ce578 (length 16) Mar 8 12:33:25.421598: | vendor id hash md5 init Mar 8 12:33:25.421602: | vendor id hash md5 digest data-bytes@0x558b8b708b10 (length 41) Mar 8 12:33:25.421606: | vendor id hash md5 final bytes@0x7ffc75e8d2e0 (length 16) Mar 8 12:33:25.421610: | vendor id hash md5 init Mar 8 12:33:25.421614: | vendor id hash md5 digest data-bytes@0x558b8b708b40 (length 53) Mar 8 12:33:25.421617: | vendor id hash md5 final bytes@0x7ffc75e8d2e0 (length 16) Mar 8 12:33:25.421621: | vendor id hash md5 init Mar 8 12:33:25.421626: | vendor id hash md5 digest data-bytes@0x558b8b708b78 (length 58) Mar 8 12:33:25.421629: | vendor id hash md5 final bytes@0x7ffc75e8d2e0 (length 16) Mar 8 12:33:25.421633: | vendor id hash md5 init Mar 8 12:33:25.421638: | vendor id hash md5 digest data-bytes@0x558b8b707c8c (length 14) Mar 8 12:33:25.421641: | vendor id hash md5 final bytes@0x7ffc75e8d2e0 (length 16) Mar 8 12:33:25.421645: | vendor id hash md5 init Mar 8 12:33:25.421649: | vendor id hash md5 digest data-bytes@0x558b8b708be0 (length 37) Mar 8 12:33:25.421653: | vendor id hash md5 final bytes@0x558b8d1ce6f8 (length 16) Mar 8 12:33:25.421656: | vendor id hash md5 init Mar 8 12:33:25.421661: | vendor id hash md5 digest data-bytes@0x558b8b708c08 (length 37) Mar 8 12:33:25.421664: | vendor id hash md5 final bytes@0x558b8d1ce738 (length 16) Mar 8 12:33:25.421668: | vendor id hash md5 init Mar 8 12:33:25.421672: | vendor id hash md5 digest data-bytes@0x558b8b707cb4 (length 10) Mar 8 12:33:25.421675: | vendor id hash md5 final bytes@0x558b8d1ce778 (length 16) Mar 8 12:33:25.421679: | vendor id hash md5 init Mar 8 12:33:25.421683: | vendor id hash md5 digest data-bytes@0x558b8b708c30 (length 38) Mar 8 12:33:25.421687: | vendor id hash md5 final bytes@0x558b8d1ce7b8 (length 16) Mar 8 12:33:25.421691: | vendor id hash md5 init Mar 8 12:33:25.421695: | vendor id hash md5 digest data-bytes@0x558b8b707cbf (length 29) Mar 8 12:33:25.421698: | vendor id hash md5 final bytes@0x558b8d1ce7f8 (length 16) Mar 8 12:33:25.421702: | vendor id hash md5 init Mar 8 12:33:25.421707: | vendor id hash md5 digest data-bytes@0x558b8b707cdd (length 29) Mar 8 12:33:25.421710: | vendor id hash md5 final bytes@0x558b8d1ce838 (length 16) Mar 8 12:33:25.421714: | vendor id hash md5 init Mar 8 12:33:25.421718: | vendor id hash md5 digest data-bytes@0x558b8b707cfb (length 29) Mar 8 12:33:25.421722: | vendor id hash md5 final bytes@0x558b8d1ce878 (length 16) Mar 8 12:33:25.421725: | vendor id hash md5 init Mar 8 12:33:25.421730: | vendor id hash md5 digest data-bytes@0x558b8b708c58 (length 30) Mar 8 12:33:25.421733: | vendor id hash md5 final bytes@0x558b8d1ce8b8 (length 16) Mar 8 12:33:25.421737: | vendor id hash md5 init Mar 8 12:33:25.421741: | vendor id hash md5 digest data-bytes@0x558b8b707d19 (length 29) Mar 8 12:33:25.421744: | vendor id hash md5 final bytes@0x558b8d1ce8f8 (length 16) Mar 8 12:33:25.421748: | vendor id hash md5 init Mar 8 12:33:25.421754: | vendor id hash md5 digest data-bytes@0x558b8b707d37 (length 29) Mar 8 12:33:25.421759: | vendor id hash md5 final bytes@0x558b8d1ce938 (length 16) Mar 8 12:33:25.421763: | vendor id hash md5 init Mar 8 12:33:25.421767: | vendor id hash md5 digest data-bytes@0x558b8b707d55 (length 29) Mar 8 12:33:25.421771: | vendor id hash md5 final bytes@0x558b8d1ce978 (length 16) Mar 8 12:33:25.421775: | vendor id hash md5 init Mar 8 12:33:25.421779: | vendor id hash md5 digest data-bytes@0x558b8b707d73 (length 29) Mar 8 12:33:25.421782: | vendor id hash md5 final bytes@0x558b8d1ce9b8 (length 16) Mar 8 12:33:25.421786: | vendor id hash md5 init Mar 8 12:33:25.421790: | vendor id hash md5 digest data-bytes@0x558b8b707d91 (length 29) Mar 8 12:33:25.421794: | vendor id hash md5 final bytes@0x558b8d1ce9f8 (length 16) Mar 8 12:33:25.421797: | vendor id hash md5 init Mar 8 12:33:25.421802: | vendor id hash md5 digest data-bytes@0x558b8b707daf (length 29) Mar 8 12:33:25.421805: | vendor id hash md5 final bytes@0x558b8d1cea38 (length 16) Mar 8 12:33:25.421809: | vendor id hash md5 init Mar 8 12:33:25.421813: | vendor id hash md5 digest data-bytes@0x558b8b707dcd (length 26) Mar 8 12:33:25.421817: | vendor id hash md5 final bytes@0x558b8d1cea78 (length 16) Mar 8 12:33:25.421820: | vendor id hash md5 init Mar 8 12:33:25.421825: | vendor id hash md5 digest data-bytes@0x558b8b707de8 (length 8) Mar 8 12:33:25.421828: | vendor id hash md5 final bytes@0x558b8d1ceab8 (length 16) Mar 8 12:33:25.421833: | vendor id hash md5 init Mar 8 12:33:25.421837: | vendor id hash md5 digest data-bytes@0x558b8b7104ae (length 13) Mar 8 12:33:25.421841: | vendor id hash md5 final bytes@0x558b8d1ceb78 (length 16) Mar 8 12:33:25.421845: | vendor id hash md5 init Mar 8 12:33:25.421849: | vendor id hash md5 digest data-bytes@0x558b8b707e8e (length 19) Mar 8 12:33:25.421852: | vendor id hash md5 final bytes@0x558b8d1cebb8 (length 16) Mar 8 12:33:25.421857: | vendor id hash md5 init Mar 8 12:33:25.421861: | vendor id hash md5 digest data-bytes@0x558b8b708cb8 (length 32) Mar 8 12:33:25.421864: | vendor id hash md5 final bytes@0x558b8d1cebf8 (length 16) Mar 8 12:33:25.421868: | vendor id hash md5 init Mar 8 12:33:25.421873: | vendor id hash md5 digest data-bytes@0x558b8b707ea2 (length 17) Mar 8 12:33:25.421876: | vendor id hash md5 final bytes@0x558b8d1cec38 (length 16) Mar 8 12:33:25.421880: | vendor id hash md5 init Mar 8 12:33:25.421884: | vendor id hash md5 digest data-bytes@0x558b8b707eb4 (length 14) Mar 8 12:33:25.421888: | vendor id hash md5 final bytes@0x558b8d1cec78 (length 16) Mar 8 12:33:25.421892: | vendor id hash md5 init Mar 8 12:33:25.421896: | vendor id hash md5 digest data-bytes@0x558b8b6f8f43 (length 10) Mar 8 12:33:25.421899: | vendor id hash md5 final bytes@0x558b8d1cecb8 (length 16) Mar 8 12:33:25.421903: | vendor id hash md5 init Mar 8 12:33:25.421908: | vendor id hash md5 digest data-bytes@0x558b8b707ec3 (length 16) Mar 8 12:33:25.421911: | vendor id hash md5 final bytes@0x558b8d1ced68 (length 16) Mar 8 12:33:25.421915: | vendor id hash md5 init Mar 8 12:33:25.421919: | vendor id hash md5 digest data-bytes@0x558b8b707ed4 (length 16) Mar 8 12:33:25.421922: | vendor id hash md5 final bytes@0x558b8d1ceda8 (length 16) Mar 8 12:33:25.421926: | vendor id hash md5 init Mar 8 12:33:25.421930: | vendor id hash md5 digest data-bytes@0x558b8b707ee5 (length 16) Mar 8 12:33:25.421937: | vendor id hash md5 final bytes@0x558b8d1cede8 (length 16) Mar 8 12:33:25.421941: | vendor id hash md5 init Mar 8 12:33:25.421945: | vendor id hash md5 digest data-bytes@0x558b8b707ef6 (length 16) Mar 8 12:33:25.421949: | vendor id hash md5 final bytes@0x558b8d1cee28 (length 16) Mar 8 12:33:25.421953: | vendor id hash md5 init Mar 8 12:33:25.421957: | vendor id hash md5 digest data-bytes@0x558b8b707f07 (length 16) Mar 8 12:33:25.421960: | vendor id hash md5 final bytes@0x558b8d1cee68 (length 16) Mar 8 12:33:25.421964: | vendor id hash md5 init Mar 8 12:33:25.421970: | vendor id hash md5 digest data-bytes@0x558b8b707f18 (length 16) Mar 8 12:33:25.421974: | vendor id hash md5 final bytes@0x558b8d1ceea8 (length 16) Mar 8 12:33:25.421980: | vendor id hash md5 init Mar 8 12:33:25.421984: | vendor id hash md5 digest data-bytes@0x558b8b707f29 (length 16) Mar 8 12:33:25.421988: | vendor id hash md5 final bytes@0x558b8d1ceee8 (length 16) Mar 8 12:33:25.421991: | vendor id hash md5 init Mar 8 12:33:25.421996: | vendor id hash md5 digest data-bytes@0x558b8b707f3a (length 16) Mar 8 12:33:25.421999: | vendor id hash md5 final bytes@0x558b8d1cef28 (length 16) Mar 8 12:33:25.422003: | vendor id hash md5 init Mar 8 12:33:25.422007: | vendor id hash md5 digest data-bytes@0x558b8b707f4b (length 16) Mar 8 12:33:25.422010: | vendor id hash md5 final bytes@0x558b8d1cef68 (length 16) Mar 8 12:33:25.422014: | vendor id hash md5 init Mar 8 12:33:25.422018: | vendor id hash md5 digest data-bytes@0x558b8b707f5c (length 16) Mar 8 12:33:25.422022: | vendor id hash md5 final bytes@0x558b8d1cefa8 (length 16) Mar 8 12:33:25.422026: | vendor id hash md5 init Mar 8 12:33:25.422031: | vendor id hash md5 digest data-bytes@0x558b8b707f6d (length 16) Mar 8 12:33:25.422035: | vendor id hash md5 final bytes@0x558b8d1cefe8 (length 16) Mar 8 12:33:25.422039: | vendor id hash md5 init Mar 8 12:33:25.422043: | vendor id hash md5 digest data-bytes@0x558b8b707f7e (length 16) Mar 8 12:33:25.422047: | vendor id hash md5 final bytes@0x558b8d1cf028 (length 16) Mar 8 12:33:25.422050: | vendor id hash md5 init Mar 8 12:33:25.422055: | vendor id hash md5 digest data-bytes@0x558b8b707f8f (length 16) Mar 8 12:33:25.422058: | vendor id hash md5 final bytes@0x558b8d1cf068 (length 16) Mar 8 12:33:25.422062: | vendor id hash md5 init Mar 8 12:33:25.422066: | vendor id hash md5 digest data-bytes@0x558b8b707fa0 (length 16) Mar 8 12:33:25.422069: | vendor id hash md5 final bytes@0x558b8d1cf0a8 (length 16) Mar 8 12:33:25.422073: | vendor id hash md5 init Mar 8 12:33:25.422077: | vendor id hash md5 digest data-bytes@0x558b8b707fb1 (length 16) Mar 8 12:33:25.422081: | vendor id hash md5 final bytes@0x558b8d1cf0e8 (length 16) Mar 8 12:33:25.422085: | vendor id hash md5 init Mar 8 12:33:25.422089: | vendor id hash md5 digest data-bytes@0x558b8b707fc2 (length 16) Mar 8 12:33:25.422092: | vendor id hash md5 final bytes@0x558b8d1cf128 (length 16) Mar 8 12:33:25.422096: | vendor id hash md5 init Mar 8 12:33:25.422100: | vendor id hash md5 digest data-bytes@0x558b8b707fd3 (length 16) Mar 8 12:33:25.422103: | vendor id hash md5 final bytes@0x558b8d1cf168 (length 16) Mar 8 12:33:25.422107: | vendor id hash md5 init Mar 8 12:33:25.422111: | vendor id hash md5 digest data-bytes@0x558b8b707fe4 (length 16) Mar 8 12:33:25.422115: | vendor id hash md5 final bytes@0x558b8d1cf1a8 (length 16) Mar 8 12:33:25.422119: | vendor id hash md5 init Mar 8 12:33:25.422123: | vendor id hash md5 digest data-bytes@0x558b8b707ff5 (length 17) Mar 8 12:33:25.422126: | vendor id hash md5 final bytes@0x558b8d1cf1e8 (length 16) Mar 8 12:33:25.422130: | vendor id hash md5 init Mar 8 12:33:25.422134: | vendor id hash md5 digest data-bytes@0x558b8b708007 (length 17) Mar 8 12:33:25.422138: | vendor id hash md5 final bytes@0x558b8d1cf228 (length 16) Mar 8 12:33:25.422141: | vendor id hash md5 init Mar 8 12:33:25.422145: | vendor id hash md5 digest data-bytes@0x558b8b708019 (length 16) Mar 8 12:33:25.422149: | vendor id hash md5 final bytes@0x558b8d1cf268 (length 16) Mar 8 12:33:25.422153: | vendor id hash md5 init Mar 8 12:33:25.422157: | vendor id hash md5 digest data-bytes@0x558b8b70802a (length 16) Mar 8 12:33:25.422160: | vendor id hash md5 final bytes@0x558b8d1cf2a8 (length 16) Mar 8 12:33:25.422164: | vendor id hash md5 init Mar 8 12:33:25.422168: | vendor id hash md5 digest data-bytes@0x558b8b70803b (length 16) Mar 8 12:33:25.422175: | vendor id hash md5 final bytes@0x558b8d1cf2e8 (length 16) Mar 8 12:33:25.422179: | vendor id hash md5 init Mar 8 12:33:25.422183: | vendor id hash md5 digest data-bytes@0x558b8b70804c (length 16) Mar 8 12:33:25.422187: | vendor id hash md5 final bytes@0x558b8d1cf328 (length 16) Mar 8 12:33:25.422192: | vendor id hash md5 init Mar 8 12:33:25.422196: | vendor id hash md5 digest data-bytes@0x558b8b70805d (length 16) Mar 8 12:33:25.422200: | vendor id hash md5 final bytes@0x558b8d1cf368 (length 16) Mar 8 12:33:25.422204: | vendor id hash md5 init Mar 8 12:33:25.422208: | vendor id hash md5 digest data-bytes@0x558b8b70806e (length 16) Mar 8 12:33:25.422211: | vendor id hash md5 final bytes@0x558b8d1cf3a8 (length 16) Mar 8 12:33:25.422215: | vendor id hash md5 init Mar 8 12:33:25.422219: | vendor id hash md5 digest data-bytes@0x558b8b70807f (length 16) Mar 8 12:33:25.422223: | vendor id hash md5 final bytes@0x558b8d1cf3e8 (length 16) Mar 8 12:33:25.422227: | vendor id hash md5 init Mar 8 12:33:25.422231: | vendor id hash md5 digest data-bytes@0x558b8b708090 (length 16) Mar 8 12:33:25.422234: | vendor id hash md5 final bytes@0x558b8d1cf428 (length 16) Mar 8 12:33:25.422238: | vendor id hash md5 init Mar 8 12:33:25.422242: | vendor id hash md5 digest data-bytes@0x558b8b7080a1 (length 16) Mar 8 12:33:25.422245: | vendor id hash md5 final bytes@0x558b8d1cf468 (length 16) Mar 8 12:33:25.422249: | vendor id hash md5 init Mar 8 12:33:25.422253: | vendor id hash md5 digest data-bytes@0x558b8b7080b2 (length 16) Mar 8 12:33:25.422257: | vendor id hash md5 final bytes@0x558b8d1cf4a8 (length 16) Mar 8 12:33:25.422261: | vendor id hash md5 init Mar 8 12:33:25.422265: | vendor id hash md5 digest data-bytes@0x558b8b7080c3 (length 16) Mar 8 12:33:25.422268: | vendor id hash md5 final bytes@0x558b8d1cf4e8 (length 16) Mar 8 12:33:25.422272: | vendor id hash md5 init Mar 8 12:33:25.422276: | vendor id hash md5 digest data-bytes@0x558b8b7080d4 (length 16) Mar 8 12:33:25.422280: | vendor id hash md5 final bytes@0x558b8d1cf528 (length 16) Mar 8 12:33:25.422283: | vendor id hash md5 init Mar 8 12:33:25.422287: | vendor id hash md5 digest data-bytes@0x558b8b7080e5 (length 16) Mar 8 12:33:25.422291: | vendor id hash md5 final bytes@0x558b8d1cf568 (length 16) Mar 8 12:33:25.422295: | vendor id hash md5 init Mar 8 12:33:25.422299: | vendor id hash md5 digest data-bytes@0x558b8b7080f6 (length 16) Mar 8 12:33:25.422302: | vendor id hash md5 final bytes@0x558b8d1cf5a8 (length 16) Mar 8 12:33:25.422306: | vendor id hash md5 init Mar 8 12:33:25.422312: | vendor id hash md5 digest data-bytes@0x558b8b708107 (length 16) Mar 8 12:33:25.422315: | vendor id hash md5 final bytes@0x558b8d1cf5e8 (length 16) Mar 8 12:33:25.422319: | vendor id hash md5 init Mar 8 12:33:25.422323: | vendor id hash md5 digest data-bytes@0x558b8b708118 (length 16) Mar 8 12:33:25.422327: | vendor id hash md5 final bytes@0x558b8d1cf628 (length 16) Mar 8 12:33:25.422331: | vendor id hash md5 init Mar 8 12:33:25.422335: | vendor id hash md5 digest data-bytes@0x558b8b708129 (length 16) Mar 8 12:33:25.422338: | vendor id hash md5 final bytes@0x558b8d1cf668 (length 16) Mar 8 12:33:25.422342: | vendor id hash md5 init Mar 8 12:33:25.422346: | vendor id hash md5 digest data-bytes@0x558b8b70813a (length 16) Mar 8 12:33:25.422349: | vendor id hash md5 final bytes@0x558b8d1cf6a8 (length 16) Mar 8 12:33:25.422353: | vendor id hash md5 init Mar 8 12:33:25.422357: | vendor id hash md5 digest data-bytes@0x558b8b70814b (length 16) Mar 8 12:33:25.422361: | vendor id hash md5 final bytes@0x558b8d1cf6e8 (length 16) Mar 8 12:33:25.422365: | vendor id hash md5 init Mar 8 12:33:25.422369: | vendor id hash md5 digest data-bytes@0x558b8b70815c (length 16) Mar 8 12:33:25.422372: | vendor id hash md5 final bytes@0x558b8d1cf728 (length 16) Mar 8 12:33:25.422376: | vendor id hash md5 init Mar 8 12:33:25.422380: | vendor id hash md5 digest data-bytes@0x558b8b70816d (length 16) Mar 8 12:33:25.422384: | vendor id hash md5 final bytes@0x558b8d1cf768 (length 16) Mar 8 12:33:25.422387: | vendor id hash md5 init Mar 8 12:33:25.422391: | vendor id hash md5 digest data-bytes@0x558b8b70817e (length 16) Mar 8 12:33:25.422395: | vendor id hash md5 final bytes@0x558b8d1cf7a8 (length 16) Mar 8 12:33:25.422399: | vendor id hash md5 init Mar 8 12:33:25.422403: | vendor id hash md5 digest data-bytes@0x558b8b70818f (length 16) Mar 8 12:33:25.422408: | vendor id hash md5 final bytes@0x558b8d1cf7e8 (length 16) Mar 8 12:33:25.422412: | vendor id hash md5 init Mar 8 12:33:25.422416: | vendor id hash md5 digest data-bytes@0x558b8b7081a0 (length 16) Mar 8 12:33:25.422419: | vendor id hash md5 final bytes@0x558b8d1cf828 (length 16) Mar 8 12:33:25.422423: | vendor id hash md5 init Mar 8 12:33:25.422427: | vendor id hash md5 digest data-bytes@0x558b8b7081b1 (length 16) Mar 8 12:33:25.422431: | vendor id hash md5 final bytes@0x558b8d1cf868 (length 16) Mar 8 12:33:25.422434: | vendor id hash md5 init Mar 8 12:33:25.422438: | vendor id hash md5 digest data-bytes@0x558b8b7081c2 (length 16) Mar 8 12:33:25.422442: | vendor id hash md5 final bytes@0x558b8d1cf8a8 (length 16) Mar 8 12:33:25.422446: | vendor id hash md5 init Mar 8 12:33:25.422450: | vendor id hash md5 digest data-bytes@0x558b8b7081d3 (length 16) Mar 8 12:33:25.422453: | vendor id hash md5 final bytes@0x558b8d1cf8e8 (length 16) Mar 8 12:33:25.422457: | vendor id hash md5 init Mar 8 12:33:25.422461: | vendor id hash md5 digest data-bytes@0x558b8b7081e4 (length 16) Mar 8 12:33:25.422465: | vendor id hash md5 final bytes@0x558b8d1cf928 (length 16) Mar 8 12:33:25.422468: | vendor id hash md5 init Mar 8 12:33:25.422473: | vendor id hash md5 digest data-bytes@0x558b8b7081f5 (length 16) Mar 8 12:33:25.422476: | vendor id hash md5 final bytes@0x558b8d1cf968 (length 16) Mar 8 12:33:25.422480: | vendor id hash md5 init Mar 8 12:33:25.422484: | vendor id hash md5 digest data-bytes@0x558b8b708206 (length 16) Mar 8 12:33:25.422487: | vendor id hash md5 final bytes@0x558b8d1cf9a8 (length 16) Mar 8 12:33:25.422491: | vendor id hash md5 init Mar 8 12:33:25.422495: | vendor id hash md5 digest data-bytes@0x558b8b708217 (length 16) Mar 8 12:33:25.422499: | vendor id hash md5 final bytes@0x558b8d1cf9e8 (length 16) Mar 8 12:33:25.422503: | vendor id hash md5 init Mar 8 12:33:25.422507: | vendor id hash md5 digest data-bytes@0x558b8b708228 (length 16) Mar 8 12:33:25.422510: | vendor id hash md5 final bytes@0x558b8d1cfa28 (length 16) Mar 8 12:33:25.422514: | vendor id hash md5 init Mar 8 12:33:25.422518: | vendor id hash md5 digest data-bytes@0x558b8b708239 (length 16) Mar 8 12:33:25.422522: | vendor id hash md5 final bytes@0x558b8d1cfa68 (length 16) Mar 8 12:33:25.422525: | vendor id hash md5 init Mar 8 12:33:25.422530: | vendor id hash md5 digest data-bytes@0x558b8b70824a (length 16) Mar 8 12:33:25.422533: | vendor id hash md5 final bytes@0x558b8d1cfaa8 (length 16) Mar 8 12:33:25.422537: | vendor id hash md5 init Mar 8 12:33:25.422541: | vendor id hash md5 digest data-bytes@0x558b8b70825b (length 16) Mar 8 12:33:25.422544: | vendor id hash md5 final bytes@0x558b8d1cfae8 (length 16) Mar 8 12:33:25.422548: | vendor id hash md5 init Mar 8 12:33:25.422552: | vendor id hash md5 digest data-bytes@0x558b8b70826c (length 16) Mar 8 12:33:25.422556: | vendor id hash md5 final bytes@0x558b8d1cfb28 (length 16) Mar 8 12:33:25.422559: | vendor id hash md5 init Mar 8 12:33:25.422564: | vendor id hash md5 digest data-bytes@0x558b8b70827d (length 16) Mar 8 12:33:25.422567: | vendor id hash md5 final bytes@0x558b8d1cfb68 (length 16) Mar 8 12:33:25.422571: | vendor id hash md5 init Mar 8 12:33:25.422576: | vendor id hash md5 digest data-bytes@0x558b8b70828e (length 16) Mar 8 12:33:25.422580: | vendor id hash md5 final bytes@0x558b8d1cfba8 (length 16) Mar 8 12:33:25.422584: | vendor id hash md5 init Mar 8 12:33:25.422588: | vendor id hash md5 digest data-bytes@0x558b8b70829f (length 16) Mar 8 12:33:25.422591: | vendor id hash md5 final bytes@0x558b8d1cfbe8 (length 16) Mar 8 12:33:25.422595: | vendor id hash md5 init Mar 8 12:33:25.422599: | vendor id hash md5 digest data-bytes@0x558b8b7082b0 (length 16) Mar 8 12:33:25.422603: | vendor id hash md5 final bytes@0x558b8d1cfc28 (length 16) Mar 8 12:33:25.422606: | vendor id hash md5 init Mar 8 12:33:25.422610: | vendor id hash md5 digest data-bytes@0x558b8b7082c1 (length 16) Mar 8 12:33:25.422615: | vendor id hash md5 final bytes@0x558b8d1cfc68 (length 16) Mar 8 12:33:25.422619: | vendor id hash md5 init Mar 8 12:33:25.422623: | vendor id hash md5 digest data-bytes@0x558b8b7104ae (length 13) Mar 8 12:33:25.422627: | vendor id hash md5 final bytes@0x558b8d1cfca8 (length 16) Mar 8 12:33:25.422633: | selinux support is NOT enabled. Mar 8 12:33:25.422647: systemd watchdog for ipsec service configured with timeout of 200000000 usecs Mar 8 12:33:25.422650: watchdog: sending probes every 100 secs Mar 8 12:33:25.422654: | pluto_sd: executing action action: start(2), status 0 Mar 8 12:33:25.425570: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x558b8d1cfce8 Mar 8 12:33:25.425653: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Mar 8 12:33:25.425958: | unbound context created - setting debug level to 5 Mar 8 12:33:25.426078: | /etc/hosts lookups activated Mar 8 12:33:25.426182: | /etc/resolv.conf usage activated Mar 8 12:33:25.426258: | Loading dnssec root key from:/var/lib/unbound/root.key Mar 8 12:33:25.426329: | No additional dnssec trust anchors defined via dnssec-trusted= option Mar 8 12:33:25.426426: | Setting up events, loop start Mar 8 12:33:25.426792: | created addconn helper (pid:10207) using fork+execve Mar 8 12:33:25.426883: | forked child 10207 Mar 8 12:33:25.426961: | pid table: inserting object 0x558b8d1384b8 (addconn pid 10207) entry 0x558b8d1384c0 into list 0x558b8b961d60 (older 0x558b8b961d60 newer 0x558b8b961d60) Mar 8 12:33:25.427035: | pid table: inserted object 0x558b8d1384b8 (addconn pid 10207) entry 0x558b8d1384c0 (older 0x558b8b961d60 newer 0x558b8b961d60) Mar 8 12:33:25.427105: | pid table: list entry 0x558b8b961d60 is HEAD (older 0x558b8d1384c0 newer 0x558b8d1384c0) Mar 8 12:33:25.430189: | Added new connection vpn/1x1 with policy PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE+IKEV2_ALLOW+IKEV2_PROPOSE+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Mar 8 12:33:25.430204: | from whack: got --esp=aes256-sha2_256;dh14 Mar 8 12:33:25.430223: | ESP/AH string values: AES_CBC_256-HMAC_SHA2_256_128-MODP2048 Mar 8 12:33:25.430227: | ike (phase1) algorithm values: AES_CBC_256-HMAC_SHA2_256-MODP2048 Mar 8 12:33:25.430234: | counting wild cards for xxx.xxx.xx.120 is 0 Mar 8 12:33:25.430238: | counting wild cards for xxx.xxx.xxx.45 is 0 Mar 8 12:33:25.430246: added connection description "vpn/1x1" Mar 8 12:33:25.430267: | xxx.xxx.xxx.80/28===xxx.xxx.xxx.92[xxx.xxx.xx.120]---xxx.xxx.xxx.81...xxx.xxx.xxx.45===xxx.xxx.xxx.17/32 Mar 8 12:33:25.430273: | ike_life: 28800s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE+IKEV2_ALLOW+IKEV2_PROPOSE+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Mar 8 12:33:25.430409: | pluto_sd: executing action action: reloading(4), status 0 Mar 8 12:33:25.430430: listening for IKE messages Mar 8 12:33:25.430458: | Inspecting interface lo Mar 8 12:33:25.430465: | found lo with address 127.0.0.1 Mar 8 12:33:25.430469: | Inspecting interface eth0 Mar 8 12:33:25.430473: | found eth0 with address xxx.xxx.xxx.92 Mar 8 12:33:25.430522: adding interface eth0/eth0 xxx.xxx.xxx.92:500 Mar 8 12:33:25.430541: | NAT-Traversal: Trying sockopt style NAT-T Mar 8 12:33:25.430546: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Mar 8 12:33:25.430550: adding interface eth0/eth0 xxx.xxx.xxx.92:4500 Mar 8 12:33:25.430568: adding interface lo/lo 127.0.0.1:500 Mar 8 12:33:25.430583: | NAT-Traversal: Trying sockopt style NAT-T Mar 8 12:33:25.430588: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Mar 8 12:33:25.430591: adding interface lo/lo 127.0.0.1:4500 Mar 8 12:33:25.430627: | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001 Mar 8 12:33:25.430661: adding interface lo/lo ::1:500 Mar 8 12:33:25.430685: | connect_to_host_pair: xxx.xxx.xxx.92:500 xxx.xxx.xxx.45:500 -> hp:none Mar 8 12:33:25.430695: | setup callback for interface lo:500 fd 19 Mar 8 12:33:25.430701: | setup callback for interface lo:4500 fd 18 Mar 8 12:33:25.430714: | setup callback for interface lo:500 fd 17 Mar 8 12:33:25.430719: | setup callback for interface eth0:4500 fd 16 Mar 8 12:33:25.430723: | setup callback for interface eth0:500 fd 15 Mar 8 12:33:25.430729: | certs and keys locked by 'free_preshared_secrets' Mar 8 12:33:25.430732: | certs and keys unlocked by 'free_preshard_secrets' Mar 8 12:33:25.430753: loading secrets from "/etc/ipsec.secrets" Mar 8 12:33:25.430781: no secrets filename matched "/etc/ipsec.d/*.secrets" Mar 8 12:33:25.430791: | id type added to secret(0x558b8d1a3458) PKK_PSK: xxx.xxx.xxx.45 Mar 8 12:33:25.430796: | id type added to secret(0x558b8d1a3458) PKK_PSK: (none) Mar 8 12:33:25.430800: | id type added to secret(0x558b8d1a3458) PKK_PSK: %any Mar 8 12:33:25.430806: | Processing PSK at line 2: passed Mar 8 12:33:25.430809: | certs and keys locked by 'process_secret' Mar 8 12:33:25.430812: | certs and keys unlocked by 'process_secret' Mar 8 12:33:25.430818: | pluto_sd: executing action action: ready(5), status 0 Mar 8 12:33:25.431491: initiating all conns with alias='vpn' Mar 8 12:33:25.431513: | processing: start connection "vpn/1x1" (in initiate_a_connection() at initiate.c:187) Mar 8 12:33:25.431519: | kernel_alg_db_new() initial trans_cnt=289 Mar 8 12:33:25.431531: | kernel_alg_db_new() will return p_new->protoid=3, p_new->trans_cnt=1 Mar 8 12:33:25.431535: | kernel_alg_db_new() trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=5 Mar 8 12:33:25.431541: | returning new proposal from esp_info Mar 8 12:33:25.431547: | creating state object #1 at 0x558b8d1d60b8 Mar 8 12:33:25.431551: | parent state #1: new => STATE_UNDEFINED(ignore) Mar 8 12:33:25.431569: | processing: suspend connection "vpn/1x1" (in initialize_new_state() at ipsec_doi.c:490) Mar 8 12:33:25.431575: | processing: start state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in initialize_new_state() at ipsec_doi.c:490) Mar 8 12:33:25.431578: | inserting state object #1 Mar 8 12:33:25.431583: | serialno list: inserting object 0x558b8d1d60b8 (state #1) entry 0x558b8d1d6860 into list 0x558b8b96a840 (older 0x558b8b96a840 newer 0x558b8b96a840) Mar 8 12:33:25.431587: | serialno list: inserted object 0x558b8d1d60b8 (state #1) entry 0x558b8d1d6860 (older 0x558b8b96a840 newer 0x558b8b96a840) Mar 8 12:33:25.431591: | serialno list: list entry 0x558b8b96a840 is HEAD (older 0x558b8d1d6860 newer 0x558b8d1d6860) Mar 8 12:33:25.431596: | serialno table: inserting object 0x558b8d1d60b8 (state #1) entry 0x558b8d1d6880 into list 0x558b8b95d780 (older 0x558b8b95d780 newer 0x558b8b95d780) Mar 8 12:33:25.431601: | serialno table: inserted object 0x558b8d1d60b8 (state #1) entry 0x558b8d1d6880 (older 0x558b8b95d780 newer 0x558b8b95d780) Mar 8 12:33:25.431604: | serialno table: list entry 0x558b8b95d780 is HEAD (older 0x558b8d1d6880 newer 0x558b8d1d6880) Mar 8 12:33:25.431611: | processing: [RE]START state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in initialize_new_state() at ipsec_doi.c:510) Mar 8 12:33:25.431615: | parent state #1: STATE_UNDEFINED(ignore) => STATE_PARENT_I1(half-open-ike) Mar 8 12:33:25.431619: | ignore states: 0 Mar 8 12:33:25.431622: | half-open-ike states: 1 Mar 8 12:33:25.431625: | open-ike states: 0 Mar 8 12:33:25.431628: | established-anonymous-ike states: 0 Mar 8 12:33:25.431631: | established-authenticated-ike states: 0 Mar 8 12:33:25.431643: | anonymous-ipsec states: 0 Mar 8 12:33:25.431646: | authenticated-ipsec states: 0 Mar 8 12:33:25.431649: | informational states: 0 Mar 8 12:33:25.431652: | unknown states: 0 Mar 8 12:33:25.431655: | category states: 1 count states: 1 Mar 8 12:33:25.431660: | Queuing pending IPsec SA negotiating with xxx.xxx.xxx.45 "vpn/1x1" IKE SA #1 "vpn/1x1" Mar 8 12:33:25.431665: "vpn/1x1" #1: initiating v2 parent SA Mar 8 12:33:25.431673: | constructing local IKE proposals for vpn/1x1 (IKE SA initiator selecting KE) Mar 8 12:33:25.431678: | converting ike_info AES_CBC_256-HMAC_SHA2_256-MODP2048 to ikev2 ... Mar 8 12:33:25.431686: | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048 Mar 8 12:33:25.431694: "vpn/1x1" #1: local IKE proposals for vpn/1x1 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048 Mar 8 12:33:25.431701: | DH ike_alg_lookup_by_id id: MODP2048=14, found MODP2048 Mar 8 12:33:25.431705: | adding ikev2_outI1 KE work-order 1 for state #1 Mar 8 12:33:25.431709: | state #1 requesting to delete non existing event Mar 8 12:33:25.431712: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x558b8d1d5f28 Mar 8 12:33:25.431717: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1 Mar 8 12:33:25.431723: | backlog: inserting object 0x558b8d1d76a8 (work-order 1 state #1) entry 0x558b8d1d76b0 into list 0x558b8b96b740 (older 0x558b8b96b740 newer 0x558b8b96b740) Mar 8 12:33:25.431728: | backlog: inserted object 0x558b8d1d76a8 (work-order 1 state #1) entry 0x558b8d1d76b0 (older 0x558b8b96b740 newer 0x558b8b96b740) Mar 8 12:33:25.431732: | backlog: list entry 0x558b8b96b740 is HEAD (older 0x558b8d1d76b0 newer 0x558b8d1d76b0) Mar 8 12:33:25.431739: | processing: RESET whack log_fd (was 14) (in ikev2_parent_outI1() at ikev2_parent.c:823) Mar 8 12:33:25.431744: | processing: RESET state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in ikev2_parent_outI1() at ikev2_parent.c:823) Mar 8 12:33:25.431747: | processing: RESET connection "vpn/1x1" (in ikev2_parent_outI1() at ikev2_parent.c:823) Mar 8 12:33:25.431751: | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:318) Mar 8 12:33:25.431808: | crypto helper 1 resuming Mar 8 12:33:25.431816: | backlog: removing object 0x558b8d1d76a8 (work-order 1 state #1) entry 0x558b8d1d76b0 (older 0x558b8b96b740 newer 0x558b8b96b740) Mar 8 12:33:25.431819: | backlog: empty Mar 8 12:33:25.431827: | crypto helper 1 starting work-order 1 for state #1 Mar 8 12:33:25.431832: | crypto helper 1 doing build KE and nonce; request ID 1 Mar 8 12:33:25.431859: | NSS: Value of Prime: Mar 8 12:33:25.431863: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 Mar 8 12:33:25.431866: | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 Mar 8 12:33:25.431869: | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd Mar 8 12:33:25.431872: | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 Mar 8 12:33:25.431875: | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 Mar 8 12:33:25.431878: | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed Mar 8 12:33:25.431881: | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 Mar 8 12:33:25.431884: | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 Mar 8 12:33:25.431887: | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f Mar 8 12:33:25.431890: | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb Mar 8 12:33:25.431893: | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 Mar 8 12:33:25.431895: | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b Mar 8 12:33:25.431898: | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f Mar 8 12:33:25.431901: | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 Mar 8 12:33:25.431904: | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 Mar 8 12:33:25.431907: | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff Mar 8 12:33:25.431910: | NSS: Value of base: 02 Mar 8 12:33:25.433836: | DH secret MODP2048@0x7fe110002968: created Mar 8 12:33:25.433912: | NSS: Local DH MODP2048 secret (pointer): 0x7fe110002968 Mar 8 12:33:25.433984: | NSS: Public DH wire value: Mar 8 12:33:25.434061: | 50 2f 9a 19 09 c3 5a aa 12 c1 e5 a3 27 4f 84 73 Mar 8 12:33:25.434139: | 0e 7d dc 85 eb d3 e0 67 6b 5e 3d a9 31 59 9a 3b Mar 8 12:33:25.434198: | b6 c7 40 4d f9 78 48 06 e8 5d 89 b5 43 40 b5 c0 Mar 8 12:33:25.434248: | 29 d1 8f 96 f1 29 38 22 4c 55 ed bf b0 b3 d3 2b Mar 8 12:33:25.434329: | b3 f3 1d 7c 81 3e d8 03 b6 e2 ac d7 23 a3 54 76 Mar 8 12:33:25.434407: | 55 7e 0a 39 e4 c3 48 c0 d6 b0 7c ff 3c 9a 76 b0 Mar 8 12:33:25.434474: | 19 f7 cb 1f 94 c9 10 85 ce 65 f7 d7 5e a9 75 6c Mar 8 12:33:25.434557: | 29 4a 47 da 05 33 cf 83 71 54 01 30 55 14 04 8d Mar 8 12:33:25.434635: | 92 fa 05 5b 46 7a 53 b6 f3 cc d8 80 4d 61 2f 77 Mar 8 12:33:25.434709: | f4 a5 5d 12 d6 74 37 1d 05 ff b7 b3 ae 17 c7 e3 Mar 8 12:33:25.434784: | 2b c1 58 c1 1b 63 0b b2 fa c9 c3 46 10 ce be 07 Mar 8 12:33:25.434858: | a6 07 e6 14 5e 1b 84 fa 96 e7 39 10 18 e8 20 92 Mar 8 12:33:25.434918: | 5c 4c 12 df 3c bc 7b 3e 4e e9 03 2f 42 f2 18 b3 Mar 8 12:33:25.434993: | d9 f1 eb fa b2 f6 6c f6 76 02 da 9c e1 4a 39 c5 Mar 8 12:33:25.435051: | 5c b0 b2 3e 7e c0 29 2e a0 90 28 fd 13 a6 19 37 Mar 8 12:33:25.435120: | 01 9a be e0 7a e6 07 9b 54 33 59 32 34 b5 fe d0 Mar 8 12:33:25.435215: | Generated nonce: 68 28 ec 36 c6 2c db 1e 51 66 5e 67 5e d9 fb 21 Mar 8 12:33:25.435278: | Generated nonce: 51 1a c5 83 12 0c ac f5 f7 bb 96 37 b1 55 f6 d8 Mar 8 12:33:25.435360: | crypto helper 1 finished build KE and nonce; request ID 1 time elapsed 3522 usec Mar 8 12:33:25.435428: | crypto helper 1 sending results from work-order 1 for state #1 to event queue Mar 8 12:33:25.435503: | scheduling now-event sending helper answer for #1 Mar 8 12:33:25.435612: | executing now-event sending helper answer for 1 Mar 8 12:33:25.435620: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.435624: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.435630: | processing: start state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in schedule_event_now_cb() at server.c:594) Mar 8 12:33:25.435633: | crypto helper 1 replies to request ID 1 Mar 8 12:33:25.435636: | calling continuation function 0x558b8b67e7a0 Mar 8 12:33:25.435651: | ikev2_parent_outI1_continue for #1 Mar 8 12:33:25.435655: | wire (crypto helper) group MODP2048 and state group MODP2048 match Mar 8 12:33:25.435658: | DH secret MODP2048@0x7fe110002968: transferring ownership from helper KE to state #1 Mar 8 12:33:25.435726: | **emit ISAKMP Message: Mar 8 12:33:25.435731: | initiator cookie: Mar 8 12:33:25.435734: | f2 47 10 8f 3c ec 3c 44 Mar 8 12:33:25.435737: | responder cookie: Mar 8 12:33:25.435740: | 00 00 00 00 00 00 00 00 Mar 8 12:33:25.435743: | next payload type: ISAKMP_NEXT_v2SA (0x21) Mar 8 12:33:25.435747: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Mar 8 12:33:25.435750: | exchange type: ISAKMP_v2_SA_INIT (0x22) Mar 8 12:33:25.435861: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Mar 8 12:33:25.435874: | message ID: 00 00 00 00 Mar 8 12:33:25.435878: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Mar 8 12:33:25.435882: | already determined local IKE proposals for vpn/1x1 (IKE SA initiator emitting local proposals) Mar 8 12:33:25.435886: | Emitting ikev2_proposals ... Mar 8 12:33:25.435889: | ***emit IKEv2 Security Association Payload: Mar 8 12:33:25.435892: | next payload type: ISAKMP_NEXT_v2KE (0x22) Mar 8 12:33:25.435896: | flags: none (0x0) Mar 8 12:33:25.435900: | next payload type: previous 'ISAKMP Message' 'next payload type' matches 'IKEv2 Security Association Payload' (33:ISAKMP_NEXT_v2SA) Mar 8 12:33:25.435903: | next payload type: saving payload location 'IKEv2 Security Association Payload' 'next payload type' Mar 8 12:33:25.435911: | ****emit IKEv2 Proposal Substructure Payload: Mar 8 12:33:25.435914: | last proposal: v2_PROPOSAL_LAST (0x0) Mar 8 12:33:25.435918: | prop #: 1 (0x1) Mar 8 12:33:25.435921: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Mar 8 12:33:25.435924: | spi size: 0 (0x0) Mar 8 12:33:25.435927: | # transforms: 4 (0x4) Mar 8 12:33:25.435931: | *****emit IKEv2 Transform Substructure Payload: Mar 8 12:33:25.435934: | last transform: v2_TRANSFORM_NON_LAST (0x3) Mar 8 12:33:25.435937: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Mar 8 12:33:25.435941: | IKEv2 transform ID: AES_CBC (0xc) Mar 8 12:33:25.435955: | ******emit IKEv2 Attribute Substructure Payload: Mar 8 12:33:25.435959: | af+type: IKEv2_KEY_LENGTH (0x800e) Mar 8 12:33:25.435966: | length/value: 256 (0x100) Mar 8 12:33:25.435969: | emitting length of IKEv2 Transform Substructure Payload: 12 Mar 8 12:33:25.435979: | *****emit IKEv2 Transform Substructure Payload: Mar 8 12:33:25.435984: | last transform: v2_TRANSFORM_NON_LAST (0x3) Mar 8 12:33:25.435987: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Mar 8 12:33:25.435990: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Mar 8 12:33:25.435993: | emitting length of IKEv2 Transform Substructure Payload: 8 Mar 8 12:33:25.435996: | *****emit IKEv2 Transform Substructure Payload: Mar 8 12:33:25.435999: | last transform: v2_TRANSFORM_NON_LAST (0x3) Mar 8 12:33:25.436003: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Mar 8 12:33:25.436006: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Mar 8 12:33:25.436009: | emitting length of IKEv2 Transform Substructure Payload: 8 Mar 8 12:33:25.436012: | *****emit IKEv2 Transform Substructure Payload: Mar 8 12:33:25.436015: | last transform: v2_TRANSFORM_LAST (0x0) Mar 8 12:33:25.436018: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Mar 8 12:33:25.436021: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Mar 8 12:33:25.436025: | emitting length of IKEv2 Transform Substructure Payload: 8 Mar 8 12:33:25.436028: | emitting length of IKEv2 Proposal Substructure Payload: 44 Mar 8 12:33:25.436031: | emitting length of IKEv2 Security Association Payload: 48 Mar 8 12:33:25.436035: | ***emit IKEv2 Key Exchange Payload: Mar 8 12:33:25.436038: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Mar 8 12:33:25.436042: | flags: none (0x0) Mar 8 12:33:25.436045: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Mar 8 12:33:25.436049: | next payload type: previous 'IKEv2 Security Association Payload' 'next payload type' matches 'IKEv2 Key Exchange Payload' (34:ISAKMP_NEXT_v2KE) Mar 8 12:33:25.436052: | next payload type: saving payload location 'IKEv2 Key Exchange Payload' 'next payload type' Mar 8 12:33:25.436056: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Mar 8 12:33:25.436059: | ikev2 g^x 50 2f 9a 19 09 c3 5a aa 12 c1 e5 a3 27 4f 84 73 Mar 8 12:33:25.436062: | ikev2 g^x 0e 7d dc 85 eb d3 e0 67 6b 5e 3d a9 31 59 9a 3b Mar 8 12:33:25.436065: | ikev2 g^x b6 c7 40 4d f9 78 48 06 e8 5d 89 b5 43 40 b5 c0 Mar 8 12:33:25.436068: | ikev2 g^x 29 d1 8f 96 f1 29 38 22 4c 55 ed bf b0 b3 d3 2b Mar 8 12:33:25.436071: | ikev2 g^x b3 f3 1d 7c 81 3e d8 03 b6 e2 ac d7 23 a3 54 76 Mar 8 12:33:25.436074: | ikev2 g^x 55 7e 0a 39 e4 c3 48 c0 d6 b0 7c ff 3c 9a 76 b0 Mar 8 12:33:25.436077: | ikev2 g^x 19 f7 cb 1f 94 c9 10 85 ce 65 f7 d7 5e a9 75 6c Mar 8 12:33:25.436080: | ikev2 g^x 29 4a 47 da 05 33 cf 83 71 54 01 30 55 14 04 8d Mar 8 12:33:25.436083: | ikev2 g^x 92 fa 05 5b 46 7a 53 b6 f3 cc d8 80 4d 61 2f 77 Mar 8 12:33:25.436086: | ikev2 g^x f4 a5 5d 12 d6 74 37 1d 05 ff b7 b3 ae 17 c7 e3 Mar 8 12:33:25.436089: | ikev2 g^x 2b c1 58 c1 1b 63 0b b2 fa c9 c3 46 10 ce be 07 Mar 8 12:33:25.436092: | ikev2 g^x a6 07 e6 14 5e 1b 84 fa 96 e7 39 10 18 e8 20 92 Mar 8 12:33:25.436095: | ikev2 g^x 5c 4c 12 df 3c bc 7b 3e 4e e9 03 2f 42 f2 18 b3 Mar 8 12:33:25.436098: | ikev2 g^x d9 f1 eb fa b2 f6 6c f6 76 02 da 9c e1 4a 39 c5 Mar 8 12:33:25.436101: | ikev2 g^x 5c b0 b2 3e 7e c0 29 2e a0 90 28 fd 13 a6 19 37 Mar 8 12:33:25.436104: | ikev2 g^x 01 9a be e0 7a e6 07 9b 54 33 59 32 34 b5 fe d0 Mar 8 12:33:25.436107: | emitting length of IKEv2 Key Exchange Payload: 264 Mar 8 12:33:25.436111: | ***emit IKEv2 Nonce Payload: Mar 8 12:33:25.436114: | next payload type: ISAKMP_NEXT_v2N (0x29) Mar 8 12:33:25.436117: | flags: none (0x0) Mar 8 12:33:25.436120: | next payload type: previous 'IKEv2 Key Exchange Payload' 'next payload type' matches 'IKEv2 Nonce Payload' (40:ISAKMP_NEXT_v2Ni) Mar 8 12:33:25.436124: | next payload type: saving payload location 'IKEv2 Nonce Payload' 'next payload type' Mar 8 12:33:25.436127: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Mar 8 12:33:25.436130: | IKEv2 nonce 68 28 ec 36 c6 2c db 1e 51 66 5e 67 5e d9 fb 21 Mar 8 12:33:25.436136: | IKEv2 nonce 51 1a c5 83 12 0c ac f5 f7 bb 96 37 b1 55 f6 d8 Mar 8 12:33:25.436147: | emitting length of IKEv2 Nonce Payload: 36 Mar 8 12:33:25.436150: | Adding a v2N Payload Mar 8 12:33:25.436154: | ***emit IKEv2 Notify Payload: Mar 8 12:33:25.436157: | next payload type: ISAKMP_NEXT_v2N (0x29) Mar 8 12:33:25.436160: | flags: none (0x0) Mar 8 12:33:25.436163: | Protocol ID: PROTO_v2_RESERVED (0x0) Mar 8 12:33:25.436166: | SPI size: 0 (0x0) Mar 8 12:33:25.436170: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Mar 8 12:33:25.436174: | next payload type: previous 'IKEv2 Nonce Payload' 'next payload type' matches 'IKEv2 Notify Payload' (41:ISAKMP_NEXT_v2N) Mar 8 12:33:25.436177: | next payload type: saving payload location 'IKEv2 Notify Payload' 'next payload type' Mar 8 12:33:25.436181: | emitting 0 raw bytes of Notify data into IKEv2 Notify Payload Mar 8 12:33:25.436184: | Notify data Mar 8 12:33:25.436187: | emitting length of IKEv2 Notify Payload: 8 Mar 8 12:33:25.436191: | NAT-Traversal support [enabled] add v2N payloads. Mar 8 12:33:25.436194: | natd_hash: Warning, rcookie is zero !! Mar 8 12:33:25.436198: | NATD hash sha init Mar 8 12:33:25.436210: | NATD hash sha digest ICOOKIE-bytes@0x558b8d1d65d0 (length 8) Mar 8 12:33:25.436215: | NATD hash sha digest RCOOKIE-bytes@0x558b8d1d82bc (length 8) Mar 8 12:33:25.436218: | NATD hash sha digest SIN_ADDR-bytes@0x558b8d1d63b4 (length 4) Mar 8 12:33:25.436222: | NATD hash sha digest PORT-bytes@0x7ffc75e8babe (length 2) Mar 8 12:33:25.436225: | NATD hash sha final bytes@0x7ffc75e8bb30 (length 20) Mar 8 12:33:25.436231: | natd_hash: hasher=0x558b8b9497e0(20) Mar 8 12:33:25.436235: | natd_hash: icookie= f2 47 10 8f 3c ec 3c 44 Mar 8 12:33:25.436238: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Mar 8 12:33:25.436241: | natd_hash: ip= 0a e1 42 5c Mar 8 12:33:25.436244: | natd_hash: port=500 Mar 8 12:33:25.436247: | natd_hash: hash= 1c f9 ef 66 ac 67 bf 7b ce a4 84 81 9b 92 bd 26 Mar 8 12:33:25.436250: | natd_hash: hash= 23 ee d4 f9 Mar 8 12:33:25.436253: | Adding a v2N Payload Mar 8 12:33:25.436256: | ***emit IKEv2 Notify Payload: Mar 8 12:33:25.436259: | next payload type: ISAKMP_NEXT_v2N (0x29) Mar 8 12:33:25.436262: | flags: none (0x0) Mar 8 12:33:25.436265: | Protocol ID: PROTO_v2_RESERVED (0x0) Mar 8 12:33:25.436268: | SPI size: 0 (0x0) Mar 8 12:33:25.436272: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Mar 8 12:33:25.436276: | next payload type: previous 'IKEv2 Notify Payload' 'next payload type' matches 'IKEv2 Notify Payload' (41:ISAKMP_NEXT_v2N) Mar 8 12:33:25.436279: | next payload type: saving payload location 'IKEv2 Notify Payload' 'next payload type' Mar 8 12:33:25.436282: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Mar 8 12:33:25.436285: | Notify data 1c f9 ef 66 ac 67 bf 7b ce a4 84 81 9b 92 bd 26 Mar 8 12:33:25.436288: | Notify data 23 ee d4 f9 Mar 8 12:33:25.436292: | emitting length of IKEv2 Notify Payload: 28 Mar 8 12:33:25.436295: | natd_hash: Warning, rcookie is zero !! Mar 8 12:33:25.436297: | NATD hash sha init Mar 8 12:33:25.436302: | NATD hash sha digest ICOOKIE-bytes@0x558b8d1d65d0 (length 8) Mar 8 12:33:25.436306: | NATD hash sha digest RCOOKIE-bytes@0x558b8d1d82bc (length 8) Mar 8 12:33:25.436309: | NATD hash sha digest SIN_ADDR-bytes@0x558b8d1d638c (length 4) Mar 8 12:33:25.436313: | NATD hash sha digest PORT-bytes@0x7ffc75e8babe (length 2) Mar 8 12:33:25.436316: | NATD hash sha final bytes@0x7ffc75e8bb30 (length 20) Mar 8 12:33:25.436320: | natd_hash: hasher=0x558b8b9497e0(20) Mar 8 12:33:25.436324: | natd_hash: icookie= f2 47 10 8f 3c ec 3c 44 Mar 8 12:33:25.436327: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Mar 8 12:33:25.436330: | natd_hash: ip= d4 a6 d1 2d Mar 8 12:33:25.436333: | natd_hash: port=500 Mar 8 12:33:25.436336: | natd_hash: hash= c4 82 81 68 15 b5 fe ff 59 eb b2 14 ab f1 27 2f Mar 8 12:33:25.436341: | natd_hash: hash= 13 52 35 09 Mar 8 12:33:25.436344: | Adding a v2N Payload Mar 8 12:33:25.436347: | ***emit IKEv2 Notify Payload: Mar 8 12:33:25.436351: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Mar 8 12:33:25.436354: | flags: none (0x0) Mar 8 12:33:25.436357: | Protocol ID: PROTO_v2_RESERVED (0x0) Mar 8 12:33:25.436360: | SPI size: 0 (0x0) Mar 8 12:33:25.436363: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Mar 8 12:33:25.436367: | next payload type: previous 'IKEv2 Notify Payload' 'next payload type' matches 'IKEv2 Notify Payload' (41:ISAKMP_NEXT_v2N) Mar 8 12:33:25.436370: | next payload type: saving payload location 'IKEv2 Notify Payload' 'next payload type' Mar 8 12:33:25.436373: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Mar 8 12:33:25.436376: | Notify data c4 82 81 68 15 b5 fe ff 59 eb b2 14 ab f1 27 2f Mar 8 12:33:25.436379: | Notify data 13 52 35 09 Mar 8 12:33:25.436382: | emitting length of IKEv2 Notify Payload: 28 Mar 8 12:33:25.436386: | emitting length of ISAKMP Message: 440 Mar 8 12:33:25.436392: | processing: stop state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in ikev2_parent_outI1_common() at ikev2_parent.c:1089) Mar 8 12:33:25.436396: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.436399: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.436404: | processing: start state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in complete_v2_state_transition() at ikev2.c:2787) Mar 8 12:33:25.436408: | #1 complete v2 state transition from STATE_PARENT_I1 with STF_OK Mar 8 12:33:25.436412: | IKEv2: transition from state STATE_IKEv2_BASE to state STATE_PARENT_I1 Mar 8 12:33:25.436417: | message ID #1 STATE_PARENT_I1 vpn/1x1 pst #1 st_msgid_nextuse(before=0) 1 st_msgid_lastack 4294967295 st_msgid_lastrecv 4294967295 md is a request Mar 8 12:33:25.436421: "vpn/1x1" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 Mar 8 12:33:25.436425: | sending V2 new request packet to xxx.xxx.xxx.45:500 (from port 500) Mar 8 12:33:25.436437: | sending 440 bytes for STATE_IKEv2_BASE through eth0:500 to xxx.xxx.xxx.45:500 (using #1) Mar 8 12:33:25.436440: | f2 47 10 8f 3c ec 3c 44 00 00 00 00 00 00 00 00 Mar 8 12:33:25.436443: | 21 20 22 08 00 00 00 00 00 00 01 b8 22 00 00 30 Mar 8 12:33:25.436446: | 00 00 00 2c 01 01 00 04 03 00 00 0c 01 00 00 0c Mar 8 12:33:25.436449: | 80 0e 01 00 03 00 00 08 02 00 00 05 03 00 00 08 Mar 8 12:33:25.436452: | 03 00 00 0c 00 00 00 08 04 00 00 0e 28 00 01 08 Mar 8 12:33:25.436455: | 00 0e 00 00 50 2f 9a 19 09 c3 5a aa 12 c1 e5 a3 Mar 8 12:33:25.436458: | 27 4f 84 73 0e 7d dc 85 eb d3 e0 67 6b 5e 3d a9 Mar 8 12:33:25.436461: | 31 59 9a 3b b6 c7 40 4d f9 78 48 06 e8 5d 89 b5 Mar 8 12:33:25.436464: | 43 40 b5 c0 29 d1 8f 96 f1 29 38 22 4c 55 ed bf Mar 8 12:33:25.436467: | b0 b3 d3 2b b3 f3 1d 7c 81 3e d8 03 b6 e2 ac d7 Mar 8 12:33:25.436470: | 23 a3 54 76 55 7e 0a 39 e4 c3 48 c0 d6 b0 7c ff Mar 8 12:33:25.436472: | 3c 9a 76 b0 19 f7 cb 1f 94 c9 10 85 ce 65 f7 d7 Mar 8 12:33:25.436475: | 5e a9 75 6c 29 4a 47 da 05 33 cf 83 71 54 01 30 Mar 8 12:33:25.436478: | 55 14 04 8d 92 fa 05 5b 46 7a 53 b6 f3 cc d8 80 Mar 8 12:33:25.436481: | 4d 61 2f 77 f4 a5 5d 12 d6 74 37 1d 05 ff b7 b3 Mar 8 12:33:25.436484: | ae 17 c7 e3 2b c1 58 c1 1b 63 0b b2 fa c9 c3 46 Mar 8 12:33:25.436487: | 10 ce be 07 a6 07 e6 14 5e 1b 84 fa 96 e7 39 10 Mar 8 12:33:25.436490: | 18 e8 20 92 5c 4c 12 df 3c bc 7b 3e 4e e9 03 2f Mar 8 12:33:25.436493: | 42 f2 18 b3 d9 f1 eb fa b2 f6 6c f6 76 02 da 9c Mar 8 12:33:25.436496: | e1 4a 39 c5 5c b0 b2 3e 7e c0 29 2e a0 90 28 fd Mar 8 12:33:25.436499: | 13 a6 19 37 01 9a be e0 7a e6 07 9b 54 33 59 32 Mar 8 12:33:25.436502: | 34 b5 fe d0 29 00 00 24 68 28 ec 36 c6 2c db 1e Mar 8 12:33:25.436505: | 51 66 5e 67 5e d9 fb 21 51 1a c5 83 12 0c ac f5 Mar 8 12:33:25.436508: | f7 bb 96 37 b1 55 f6 d8 29 00 00 08 00 00 40 2e Mar 8 12:33:25.436513: | 29 00 00 1c 00 00 40 04 1c f9 ef 66 ac 67 bf 7b Mar 8 12:33:25.436516: | ce a4 84 81 9b 92 bd 26 23 ee d4 f9 00 00 00 1c Mar 8 12:33:25.436519: | 00 00 40 05 c4 82 81 68 15 b5 fe ff 59 eb b2 14 Mar 8 12:33:25.436522: | ab f1 27 2f 13 52 35 09 Mar 8 12:33:25.436552: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Mar 8 12:33:25.436560: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x558b8d1d5f28 Mar 8 12:33:25.436564: | success_v2_state_transition scheduling EVENT_v2_RETRANSMIT of c->r_interval=500ms Mar 8 12:33:25.436569: | event_schedule: new EVENT_v2_RETRANSMIT-pe@0x558b8d1d5f28 Mar 8 12:33:25.436574: | inserting event EVENT_v2_RETRANSMIT, timeout in 0.500 seconds for #1 Mar 8 12:33:25.436580: | #1 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 16332.623 Mar 8 12:33:25.436585: | processing: stop state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in schedule_event_now_cb() at server.c:597) Mar 8 12:33:25.436589: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.436592: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.436931: | crypto helper 1 waiting (nothing to do) Mar 8 12:33:25.437375: | waitpid returned pid 10207 (exited with status 0) Mar 8 12:33:25.437465: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.437557: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.437613: | reaped addconn helper child (status 0) Mar 8 12:33:25.437697: | pid table: removing object 0x558b8d1384b8 (addconn pid 10207) entry 0x558b8d1384c0 (older 0x558b8b961d60 newer 0x558b8b961d60) Mar 8 12:33:25.437777: | pid table: empty Mar 8 12:33:25.437848: | waitpid returned ECHILD (no child processes left) Mar 8 12:33:25.473138: | *received 563 bytes from xxx.xxx.xxx.45:500 on eth0 (port=500) Mar 8 12:33:25.473256: | f2 47 10 8f 3c ec 3c 44 bf 96 78 8b a5 ae d9 70 Mar 8 12:33:25.473308: | 21 20 22 20 00 00 00 00 00 00 02 33 22 00 00 30 Mar 8 12:33:25.473379: | 00 00 00 2c 01 01 00 04 03 00 00 0c 01 00 00 0c Mar 8 12:33:25.473447: | 80 0e 01 00 03 00 00 08 02 00 00 05 03 00 00 08 Mar 8 12:33:25.473544: | 03 00 00 0c 00 00 00 08 04 00 00 0e 28 00 01 08 Mar 8 12:33:25.473616: | 00 0e 00 00 1d da 98 e6 90 ab f6 45 04 ab 65 32 Mar 8 12:33:25.473701: | f0 7e 04 33 5b f0 04 b7 22 2f 2f c1 26 e1 21 e3 Mar 8 12:33:25.473783: | 35 fe 5f 1c c3 0d 06 0c 1c 43 32 5f b1 5c 68 cb Mar 8 12:33:25.473849: | 95 62 fe 63 6e b6 51 4c 93 56 51 93 eb 27 9d f3 Mar 8 12:33:25.473949: | 57 84 65 c7 c8 e2 70 09 51 53 de 09 ee cb 96 b6 Mar 8 12:33:25.474024: | be ae b2 13 5c 33 ab 27 4a eb d0 e5 9c 6d c0 6e Mar 8 12:33:25.474104: | 6e 62 d8 b2 46 fb aa 3b cd 70 2c 21 fb 55 80 4c Mar 8 12:33:25.474170: | 49 87 7d a1 3a a6 49 ca df 14 56 6b f4 6c e3 8d Mar 8 12:33:25.474234: | 5f 22 aa 0e 7e 7c 57 35 66 73 e1 5d e3 21 b6 ff Mar 8 12:33:25.474314: | 1e 85 4c 13 56 e6 cc aa 5e 1b f3 d6 cc 2c c4 25 Mar 8 12:33:25.474369: | 63 be 67 d0 7a 29 0a 42 65 c5 af cd 7d a8 e7 ca Mar 8 12:33:25.474432: | cb 0e 01 bc 6c 12 f0 79 9e fc a7 1a a6 7e ea fd Mar 8 12:33:25.474502: | e6 ad 0d 87 b2 76 1f a5 e8 54 97 5f b8 cd e9 75 Mar 8 12:33:25.474574: | ab 16 99 7b 04 d4 ea 9d 7a a6 28 30 8a 57 73 15 Mar 8 12:33:25.474651: | c6 95 cd 5b 20 7c 08 4a e2 0e c8 02 49 f7 59 41 Mar 8 12:33:25.474725: | f1 ef d6 f5 87 e1 2b 82 88 c8 d0 9d 02 b1 90 1e Mar 8 12:33:25.474786: | 2b ac 90 3d 2b 00 00 44 bd 1c 7e a0 ac bc 86 fa Mar 8 12:33:25.474865: | ba bd 78 ea d8 b0 96 92 7d e6 68 e3 cb 38 ae b0 Mar 8 12:33:25.474935: | e6 c6 35 d9 60 b3 39 05 ee 30 d5 9b f4 04 4a 3f Mar 8 12:33:25.474998: | 92 ac 22 e5 b8 b6 fd 3a e6 a4 22 c7 ef 7b da 9e Mar 8 12:33:25.475072: | 05 bd c7 a7 a9 16 ac ff 2b 00 00 17 43 49 53 43 Mar 8 12:33:25.475143: | 4f 2d 44 45 4c 45 54 45 2d 52 45 41 53 4f 4e 26 Mar 8 12:33:25.475234: | 00 00 3b 43 49 53 43 4f 28 43 4f 50 59 52 49 47 Mar 8 12:33:25.475301: | 48 54 29 26 43 6f 70 79 72 69 67 68 74 20 28 63 Mar 8 12:33:25.475373: | 29 20 32 30 30 39 20 43 69 73 63 6f 20 53 79 73 Mar 8 12:33:25.475449: | 74 65 6d 73 2c 20 49 6e 63 2e 29 00 00 2d 04 31 Mar 8 12:33:25.475520: | f5 dd 3a a5 70 66 df 75 f8 7f bf 96 1b fa ec 43 Mar 8 12:33:25.475597: | d6 88 5b 73 97 82 ea b4 04 16 6e 25 d4 82 3c 37 Mar 8 12:33:25.475689: | db f8 a8 12 fb cf 26 2b 00 00 08 00 00 40 2e 00 Mar 8 12:33:25.475766: | 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 Mar 8 12:33:25.475840: | d6 c2 d3 Mar 8 12:33:25.475929: | processing: start from xxx.xxx.xxx.45:500 (in process_md() at demux.c:392) Mar 8 12:33:25.476014: | **parse ISAKMP Message: Mar 8 12:33:25.476084: | initiator cookie: Mar 8 12:33:25.476164: | f2 47 10 8f 3c ec 3c 44 Mar 8 12:33:25.476247: | responder cookie: Mar 8 12:33:25.476320: | bf 96 78 8b a5 ae d9 70 Mar 8 12:33:25.476413: | next payload type: ISAKMP_NEXT_v2SA (0x21) Mar 8 12:33:25.476481: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Mar 8 12:33:25.476570: | exchange type: ISAKMP_v2_SA_INIT (0x22) Mar 8 12:33:25.476639: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Mar 8 12:33:25.476706: | message ID: 00 00 00 00 Mar 8 12:33:25.476763: | length: 563 (0x233) Mar 8 12:33:25.476840: | processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34) Mar 8 12:33:25.476915: | I am receiving an IKEv2 Response ISAKMP_v2_SA_INIT Mar 8 12:33:25.476968: | I am the IKE SA Original Initiator Mar 8 12:33:25.477037: | icookie table: hash icookie f2 47 10 8f 3c ec 3c 44 to 15206848831443434396 slot 0x558b8b95c6a0 Mar 8 12:33:25.477110: | parent_init v2 peer and cookies match on #1 Mar 8 12:33:25.477165: | v2 state object #1 found, in STATE_PARENT_I1 Mar 8 12:33:25.477230: | rehashing state object #1 Mar 8 12:33:25.477294: | icookie table: cookies table: re-hashing state #1 cookies Mar 8 12:33:25.477365: | found state #1 Mar 8 12:33:25.477424: | processing: start state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in ikev2_process_packet() at ikev2.c:1538) Mar 8 12:33:25.477523: | processing: start connection "vpn/1x1" (BACKGROUND) (in ikev2_process_packet() at ikev2.c:1543) Mar 8 12:33:25.477585: | #1 is idle Mar 8 12:33:25.477658: | #1 idle Mar 8 12:33:25.477762: | #1 in state PARENT_I1: sent v2I1, expected v2R1 Mar 8 12:33:25.477794: | Unpacking clear payload for svm: Initiator: process SA_INIT reply notification Mar 8 12:33:25.477841: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Mar 8 12:33:25.477867: | ***parse IKEv2 Security Association Payload: Mar 8 12:33:25.477897: | next payload type: ISAKMP_NEXT_v2KE (0x22) Mar 8 12:33:25.477939: | flags: none (0x0) Mar 8 12:33:25.478003: | length: 48 (0x30) Mar 8 12:33:25.478038: | processing payload: ISAKMP_NEXT_v2SA (len=48) Mar 8 12:33:25.478067: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Mar 8 12:33:25.478140: | ***parse IKEv2 Key Exchange Payload: Mar 8 12:33:25.478172: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Mar 8 12:33:25.478247: | flags: none (0x0) Mar 8 12:33:25.478292: | length: 264 (0x108) Mar 8 12:33:25.478325: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Mar 8 12:33:25.478393: | processing payload: ISAKMP_NEXT_v2KE (len=264) Mar 8 12:33:25.478432: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Mar 8 12:33:25.478462: | ***parse IKEv2 Nonce Payload: Mar 8 12:33:25.478534: | next payload type: ISAKMP_NEXT_v2V (0x2b) Mar 8 12:33:25.478565: | flags: none (0x0) Mar 8 12:33:25.478596: | length: 68 (0x44) Mar 8 12:33:25.478620: | processing payload: ISAKMP_NEXT_v2Ni (len=68) Mar 8 12:33:25.478658: | Now let's proceed with payload (ISAKMP_NEXT_v2V) Mar 8 12:33:25.478683: | ***parse IKEv2 Vendor ID Payload: Mar 8 12:33:25.478741: | next payload type: ISAKMP_NEXT_v2V (0x2b) Mar 8 12:33:25.478775: | flags: none (0x0) Mar 8 12:33:25.478804: | length: 23 (0x17) Mar 8 12:33:25.478886: | processing payload: ISAKMP_NEXT_v2V (len=23) Mar 8 12:33:25.478916: | Now let's proceed with payload (ISAKMP_NEXT_v2V) Mar 8 12:33:25.478946: | ***parse IKEv2 Vendor ID Payload: Mar 8 12:33:25.479027: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) Mar 8 12:33:25.479062: | flags: none (0x0) Mar 8 12:33:25.479092: | length: 59 (0x3b) Mar 8 12:33:25.479116: | processing payload: ISAKMP_NEXT_v2V (len=59) Mar 8 12:33:25.479155: | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) Mar 8 12:33:25.479183: | ***parse IKEv2 Certificate Request Payload: Mar 8 12:33:25.479242: | next payload type: ISAKMP_NEXT_v2N (0x29) Mar 8 12:33:25.479289: | flags: none (0x0) Mar 8 12:33:25.479322: | length: 45 (0x2d) Mar 8 12:33:25.479380: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Mar 8 12:33:25.479416: | processing payload: ISAKMP_NEXT_v2CERTREQ (len=45) Mar 8 12:33:25.479446: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Mar 8 12:33:25.479507: | ***parse IKEv2 Notify Payload: Mar 8 12:33:25.479551: | next payload type: ISAKMP_NEXT_v2V (0x2b) Mar 8 12:33:25.479585: | flags: none (0x0) Mar 8 12:33:25.479652: | length: 8 (0x8) Mar 8 12:33:25.479688: | Protocol ID: PROTO_v2_RESERVED (0x0) Mar 8 12:33:25.479713: | SPI size: 0 (0x0) Mar 8 12:33:25.479743: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Mar 8 12:33:25.479801: | processing payload: ISAKMP_NEXT_v2N (len=8) Mar 8 12:33:25.479847: | Now let's proceed with payload (ISAKMP_NEXT_v2V) Mar 8 12:33:25.479875: | ***parse IKEv2 Vendor ID Payload: Mar 8 12:33:25.479900: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Mar 8 12:33:25.479978: | flags: none (0x0) Mar 8 12:33:25.480010: | length: 20 (0x14) Mar 8 12:33:25.480042: | processing payload: ISAKMP_NEXT_v2V (len=20) Mar 8 12:33:25.480067: | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Mar 8 12:33:25.480092: | Now lets proceed with state specific processing Mar 8 12:33:25.480160: | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Mar 8 12:33:25.480201: | ikev2 parent inR1: calculating g^{xy} in order to send I2 Mar 8 12:33:25.480229: | DH public value received: Mar 8 12:33:25.480260: | 1d da 98 e6 90 ab f6 45 04 ab 65 32 f0 7e 04 33 Mar 8 12:33:25.480331: | 5b f0 04 b7 22 2f 2f c1 26 e1 21 e3 35 fe 5f 1c Mar 8 12:33:25.480368: | c3 0d 06 0c 1c 43 32 5f b1 5c 68 cb 95 62 fe 63 Mar 8 12:33:25.480397: | 6e b6 51 4c 93 56 51 93 eb 27 9d f3 57 84 65 c7 Mar 8 12:33:25.480428: | c8 e2 70 09 51 53 de 09 ee cb 96 b6 be ae b2 13 Mar 8 12:33:25.480497: | 5c 33 ab 27 4a eb d0 e5 9c 6d c0 6e 6e 62 d8 b2 Mar 8 12:33:25.480533: | 46 fb aa 3b cd 70 2c 21 fb 55 80 4c 49 87 7d a1 Mar 8 12:33:25.480563: | 3a a6 49 ca df 14 56 6b f4 6c e3 8d 5f 22 aa 0e Mar 8 12:33:25.480589: | 7e 7c 57 35 66 73 e1 5d e3 21 b6 ff 1e 85 4c 13 Mar 8 12:33:25.480614: | 56 e6 cc aa 5e 1b f3 d6 cc 2c c4 25 63 be 67 d0 Mar 8 12:33:25.480682: | 7a 29 0a 42 65 c5 af cd 7d a8 e7 ca cb 0e 01 bc Mar 8 12:33:25.480718: | 6c 12 f0 79 9e fc a7 1a a6 7e ea fd e6 ad 0d 87 Mar 8 12:33:25.480743: | b2 76 1f a5 e8 54 97 5f b8 cd e9 75 ab 16 99 7b Mar 8 12:33:25.480773: | 04 d4 ea 9d 7a a6 28 30 8a 57 73 15 c6 95 cd 5b Mar 8 12:33:25.480845: | 20 7c 08 4a e2 0e c8 02 49 f7 59 41 f1 ef d6 f5 Mar 8 12:33:25.480880: | 87 e1 2b 82 88 c8 d0 9d 02 b1 90 1e 2b ac 90 3d Mar 8 12:33:25.480907: | already determined local IKE proposals for vpn/1x1 (IKE SA initiator accepting remote proposal) Mar 8 12:33:25.480939: | Comparing remote proposals against IKE initiator (accepting) 1 local proposals Mar 8 12:33:25.481017: | ****parse IKEv2 Proposal Substructure Payload: Mar 8 12:33:25.481054: | last proposal: v2_PROPOSAL_LAST (0x0) Mar 8 12:33:25.481115: | length: 44 (0x2c) Mar 8 12:33:25.481164: | prop #: 1 (0x1) Mar 8 12:33:25.481195: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Mar 8 12:33:25.481252: | spi size: 0 (0x0) Mar 8 12:33:25.481291: | # transforms: 4 (0x4) Mar 8 12:33:25.481323: | Comparing remote proposal 1 containing 4 transforms against local proposal [1..1] of 1 local proposals Mar 8 12:33:25.481410: | local proposal 1 type ENCR has 1 transforms Mar 8 12:33:25.481445: | local proposal 1 type PRF has 1 transforms Mar 8 12:33:25.481489: | local proposal 1 type INTEG has 1 transforms Mar 8 12:33:25.481564: | local proposal 1 type DH has 1 transforms Mar 8 12:33:25.481600: | local proposal 1 type ESN has 0 transforms Mar 8 12:33:25.481631: | local proposal 1 transforms: required: ENCR+PRF+INTEG+DH; optional: none Mar 8 12:33:25.481700: | *****parse IKEv2 Transform Substructure Payload: Mar 8 12:33:25.481736: | last transform: v2_TRANSFORM_NON_LAST (0x3) Mar 8 12:33:25.481774: | length: 12 (0xc) Mar 8 12:33:25.481799: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Mar 8 12:33:25.481823: | IKEv2 transform ID: AES_CBC (0xc) Mar 8 12:33:25.481898: | ******parse IKEv2 Attribute Substructure Payload: Mar 8 12:33:25.481934: | af+type: IKEv2_KEY_LENGTH (0x800e) Mar 8 12:33:25.481964: | length/value: 256 (0x100) Mar 8 12:33:25.482037: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 1 type 1 (ENCR) transform 0 Mar 8 12:33:25.482075: | *****parse IKEv2 Transform Substructure Payload: Mar 8 12:33:25.482136: | last transform: v2_TRANSFORM_NON_LAST (0x3) Mar 8 12:33:25.482172: | length: 8 (0x8) Mar 8 12:33:25.482201: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Mar 8 12:33:25.482226: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Mar 8 12:33:25.482313: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_256) matches local proposal 1 type 2 (PRF) transform 0 Mar 8 12:33:25.482346: | *****parse IKEv2 Transform Substructure Payload: Mar 8 12:33:25.482377: | last transform: v2_TRANSFORM_NON_LAST (0x3) Mar 8 12:33:25.482447: | length: 8 (0x8) Mar 8 12:33:25.482484: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Mar 8 12:33:25.482514: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Mar 8 12:33:25.482541: | remote proposal 1 transform 2 (INTEG=HMAC_SHA2_256_128) matches local proposal 1 type 3 (INTEG) transform 0 Mar 8 12:33:25.482566: | *****parse IKEv2 Transform Substructure Payload: Mar 8 12:33:25.482641: | last transform: v2_TRANSFORM_LAST (0x0) Mar 8 12:33:25.482676: | length: 8 (0x8) Mar 8 12:33:25.482747: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Mar 8 12:33:25.482783: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Mar 8 12:33:25.482815: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Mar 8 12:33:25.482841: | remote proposal 1 proposed transforms: ENCR+PRF+INTEG+DH; matched: ENCR+PRF+INTEG+DH; unmatched: none Mar 8 12:33:25.482901: | comparing remote proposal 1 containing ENCR+PRF+INTEG+DH transforms to local proposal 1; required: ENCR+PRF+INTEG+DH; optional: none; matched: ENCR+PRF+INTEG+DH Mar 8 12:33:25.482947: | remote proposal 1 matches local proposal 1 Mar 8 12:33:25.483023: | remote accepted the proposal 1:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048[first-match] Mar 8 12:33:25.483060: | converting proposal to internal trans attrs Mar 8 12:33:25.483093: | encryption ike_alg_lookup_by_id id: AES_CBC=12, found AES_CBC Mar 8 12:33:25.483168: | PRF ike_alg_lookup_by_id id: HMAC_SHA2_256=5, found HMAC_SHA2_256 Mar 8 12:33:25.483207: | integrity ike_alg_lookup_by_id id: HMAC_SHA2_256_128=12, found HMAC_SHA2_256_128 Mar 8 12:33:25.483234: | DH ike_alg_lookup_by_id id: MODP2048=14, found MODP2048 Mar 8 12:33:25.483261: | message ID #1 STATE_PARENT_I1 vpn/1x1 pst #1 st_msgid_nextuse(before=1) 1 st_msgid_lastack 0 st_msgid_lastrecv 4294967295 md is a resonse Mar 8 12:33:25.483301: | NATD hash sha init Mar 8 12:33:25.483381: | NATD hash sha digest ICOOKIE-bytes@0x558b8d1d65d0 (length 8) Mar 8 12:33:25.483421: | NATD hash sha digest RCOOKIE-bytes@0x558b8d1d65f8 (length 8) Mar 8 12:33:25.483494: | NATD hash sha digest SIN_ADDR-bytes@0x558b8d1d5428 (length 4) Mar 8 12:33:25.483571: | NATD hash sha digest PORT-bytes@0x7ffc75e8b6de (length 2) Mar 8 12:33:25.483642: | NATD hash sha final bytes@0x7ffc75e8b790 (length 20) Mar 8 12:33:25.483710: | natd_hash: hasher=0x558b8b9497e0(20) Mar 8 12:33:25.483793: | natd_hash: icookie= f2 47 10 8f 3c ec 3c 44 Mar 8 12:33:25.483840: | natd_hash: rcookie= bf 96 78 8b a5 ae d9 70 Mar 8 12:33:25.483928: | natd_hash: ip= 0a e1 42 5c Mar 8 12:33:25.483998: | natd_hash: port=500 Mar 8 12:33:25.484042: | natd_hash: hash= 01 ea 56 20 13 13 56 6c 3c a6 3b 5f 49 2d 5a 00 Mar 8 12:33:25.484071: | natd_hash: hash= fb 8a 58 47 Mar 8 12:33:25.484102: | NATD hash sha init Mar 8 12:33:25.484165: | NATD hash sha digest ICOOKIE-bytes@0x558b8d1d65d0 (length 8) Mar 8 12:33:25.484199: | NATD hash sha digest RCOOKIE-bytes@0x558b8d1d65f8 (length 8) Mar 8 12:33:25.484231: | NATD hash sha digest SIN_ADDR-bytes@0x558b8d1d829c (length 4) Mar 8 12:33:25.484296: | NATD hash sha digest PORT-bytes@0x7ffc75e8b6de (length 2) Mar 8 12:33:25.484333: | NATD hash sha final bytes@0x7ffc75e8b7b0 (length 20) Mar 8 12:33:25.484367: | natd_hash: hasher=0x558b8b9497e0(20) Mar 8 12:33:25.484445: | natd_hash: icookie= f2 47 10 8f 3c ec 3c 44 Mar 8 12:33:25.484512: | natd_hash: rcookie= bf 96 78 8b a5 ae d9 70 Mar 8 12:33:25.484573: | natd_hash: ip= d4 a6 d1 2d Mar 8 12:33:25.484606: | natd_hash: port=500 Mar 8 12:33:25.484632: | natd_hash: hash= c5 90 5a 07 be da 06 af 09 94 ff 30 37 f9 16 b7 Mar 8 12:33:25.484690: | natd_hash: hash= 55 ad 57 95 Mar 8 12:33:25.484725: | NAT_TRAVERSAL local policy prohibits encapsulation Mar 8 12:33:25.484756: | NAT_TRAVERSAL nat_keepalive enabled xxx.xxx.xxx.45 Mar 8 12:33:25.484783: | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_256 integ=HMAC_SHA2_256_128 cipherkey=AES_CBC Mar 8 12:33:25.484861: | DH secret MODP2048@0x7fe110002968: transferring ownership from state #1 to helper IKEv2 DH Mar 8 12:33:25.484897: | adding ikev2_inR1outI2 KE work-order 2 for state #1 Mar 8 12:33:25.484932: | state #1 requesting EVENT_v2_RETRANSMIT to be deleted Mar 8 12:33:25.485001: | #1 STATE_PARENT_I1: retransmits: cleared Mar 8 12:33:25.485040: | free_event_entry: release EVENT_v2_RETRANSMIT-pe@0x558b8d1d5f28 Mar 8 12:33:25.485072: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x558b8d1d5f28 Mar 8 12:33:25.485100: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1 Mar 8 12:33:25.485174: | backlog: inserting object 0x558b8d1d9378 (work-order 2 state #1) entry 0x558b8d1d9380 into list 0x558b8b96b740 (older 0x558b8b96b740 newer 0x558b8b96b740) Mar 8 12:33:25.485214: | backlog: inserted object 0x558b8d1d9378 (work-order 2 state #1) entry 0x558b8d1d9380 (older 0x558b8b96b740 newer 0x558b8b96b740) Mar 8 12:33:25.485246: | backlog: list entry 0x558b8b96b740 is HEAD (older 0x558b8d1d9380 newer 0x558b8d1d9380) Mar 8 12:33:25.485337: | crypto helper 0 resuming Mar 8 12:33:25.485346: | backlog: removing object 0x558b8d1d9378 (work-order 2 state #1) entry 0x558b8d1d9380 (older 0x558b8b96b740 newer 0x558b8b96b740) Mar 8 12:33:25.485349: | backlog: empty Mar 8 12:33:25.485357: | crypto helper 0 starting work-order 2 for state #1 Mar 8 12:33:25.485361: | crypto helper 0 doing compute dh (V2); request ID 2 Mar 8 12:33:25.485369: | peer's g: 1d da 98 e6 90 ab f6 45 04 ab 65 32 f0 7e 04 33 Mar 8 12:33:25.485372: | peer's g: 5b f0 04 b7 22 2f 2f c1 26 e1 21 e3 35 fe 5f 1c Mar 8 12:33:25.485375: | peer's g: c3 0d 06 0c 1c 43 32 5f b1 5c 68 cb 95 62 fe 63 Mar 8 12:33:25.485378: | peer's g: 6e b6 51 4c 93 56 51 93 eb 27 9d f3 57 84 65 c7 Mar 8 12:33:25.485381: | peer's g: c8 e2 70 09 51 53 de 09 ee cb 96 b6 be ae b2 13 Mar 8 12:33:25.485384: | peer's g: 5c 33 ab 27 4a eb d0 e5 9c 6d c0 6e 6e 62 d8 b2 Mar 8 12:33:25.485387: | peer's g: 46 fb aa 3b cd 70 2c 21 fb 55 80 4c 49 87 7d a1 Mar 8 12:33:25.485390: | peer's g: 3a a6 49 ca df 14 56 6b f4 6c e3 8d 5f 22 aa 0e Mar 8 12:33:25.485393: | peer's g: 7e 7c 57 35 66 73 e1 5d e3 21 b6 ff 1e 85 4c 13 Mar 8 12:33:25.485400: | peer's g: 56 e6 cc aa 5e 1b f3 d6 cc 2c c4 25 63 be 67 d0 Mar 8 12:33:25.485403: | peer's g: 7a 29 0a 42 65 c5 af cd 7d a8 e7 ca cb 0e 01 bc Mar 8 12:33:25.485406: | peer's g: 6c 12 f0 79 9e fc a7 1a a6 7e ea fd e6 ad 0d 87 Mar 8 12:33:25.485409: | peer's g: b2 76 1f a5 e8 54 97 5f b8 cd e9 75 ab 16 99 7b Mar 8 12:33:25.485412: | peer's g: 04 d4 ea 9d 7a a6 28 30 8a 57 73 15 c6 95 cd 5b Mar 8 12:33:25.485415: | peer's g: 20 7c 08 4a e2 0e c8 02 49 f7 59 41 f1 ef d6 f5 Mar 8 12:33:25.485418: | peer's g: 87 e1 2b 82 88 c8 d0 9d 02 b1 90 1e 2b ac 90 3d Mar 8 12:33:25.485422: | Started DH shared-secret computation in NSS: Mar 8 12:33:25.486290: | new g_ir-key@0x558b8d1bff10, size: 256 bytes, type/mechanism: CONCATENATE_DATA_AND_BASE Mar 8 12:33:25.486300: | DH secret MODP2048@0x7fe110002968: computed shared DH secret key@0x558b8d1bff10 Mar 8 12:33:25.486305: | dh-shared g^ir-key@0x558b8d1bff10, size: 256 bytes, type/mechanism: CONCATENATE_DATA_AND_BASE Mar 8 12:33:25.486308: | NSS: Started key computation Mar 8 12:33:25.486312: | calculating skeyseed using prf=sha2_256 integ=sha2_256 cipherkey-size=32 salt-size=0 Mar 8 12:33:25.486316: | SKEYSEED = prf(Ni | Nr, g^ir) PRF sha2_256 init Ni | Nr-chunk@0x7fe108001f18 (length 96) Mar 8 12:33:25.486363: | SKEYSEED = prf(Ni | Nr, g^ir) PRF sha2_256 crypt-prf@0x7fe1080039c8 Mar 8 12:33:25.486368: | SKEYSEED = prf(Ni | Nr, g^ir) PRF sha2_256 update g^ir-key@0x558b8d1bff10 (size 256) Mar 8 12:33:25.486400: | SKEYSEED = prf(Ni | Nr, g^ir) PRF sha2_256 final-key ... Mar 8 12:33:25.486423: | SKEYSEED = prf(Ni | Nr, g^ir) PRF sha2_256 final-key@0x558b8d1c7cd0 (size 32) Mar 8 12:33:25.486452: | prf+0 PRF sha2_256 init key-key@0x558b8d1c7cd0 (size 32) Mar 8 12:33:25.486463: | prf+0 PRF sha2_256 crypt-prf@0x7fe108003978 Mar 8 12:33:25.486468: | prf+0 PRF sha2_256 update seed-key@0x558b8d1c1780 (size 112) Mar 8 12:33:25.486487: | prf+0 PRF sha2_256 update 1++-byte@0x1 (1) Mar 8 12:33:25.486492: | prf+0 PRF sha2_256 final-key ... Mar 8 12:33:25.486512: | prf+0 PRF sha2_256 final-key@0x558b8d1c9540 (size 32) Mar 8 12:33:25.486516: | prf+N PRF sha2_256 init key-key@0x558b8d1c7cd0 (size 32) Mar 8 12:33:25.486525: | prf+N PRF sha2_256 crypt-prf@0x7fe1080039c8 Mar 8 12:33:25.486529: | prf+N PRF sha2_256 update old_t-key@0x558b8d1c9540 (size 32) Mar 8 12:33:25.486545: | prf+N PRF sha2_256 update seed-key@0x558b8d1c1780 (size 112) Mar 8 12:33:25.486559: | prf+N PRF sha2_256 update N++-byte@0x2 (2) Mar 8 12:33:25.486563: | prf+N PRF sha2_256 final-key ... Mar 8 12:33:25.486582: | prf+N PRF sha2_256 final-key@0x558b8d1caa60 (size 32) Mar 8 12:33:25.486592: | prf+N PRF sha2_256 init key-key@0x558b8d1c7cd0 (size 32) Mar 8 12:33:25.486602: | prf+N PRF sha2_256 crypt-prf@0x7fe108004128 Mar 8 12:33:25.486606: | prf+N PRF sha2_256 update old_t-key@0x558b8d1caa60 (size 32) Mar 8 12:33:25.486621: | prf+N PRF sha2_256 update seed-key@0x558b8d1c1780 (size 112) Mar 8 12:33:25.486633: | prf+N PRF sha2_256 update N++-byte@0x3 (3) Mar 8 12:33:25.486637: | prf+N PRF sha2_256 final-key ... Mar 8 12:33:25.486656: | prf+N PRF sha2_256 final-key@0x558b8d1c9540 (size 32) Mar 8 12:33:25.486666: | prf+N PRF sha2_256 init key-key@0x558b8d1c7cd0 (size 32) Mar 8 12:33:25.486675: | prf+N PRF sha2_256 crypt-prf@0x7fe108003978 Mar 8 12:33:25.486679: | prf+N PRF sha2_256 update old_t-key@0x558b8d1c9540 (size 32) Mar 8 12:33:25.486695: | prf+N PRF sha2_256 update seed-key@0x558b8d1c1780 (size 112) Mar 8 12:33:25.486707: | prf+N PRF sha2_256 update N++-byte@0x4 (4) Mar 8 12:33:25.486711: | prf+N PRF sha2_256 final-key ... Mar 8 12:33:25.486730: | prf+N PRF sha2_256 final-key@0x558b8d1caa60 (size 32) Mar 8 12:33:25.486740: | prf+N PRF sha2_256 init key-key@0x558b8d1c7cd0 (size 32) Mar 8 12:33:25.486749: | prf+N PRF sha2_256 crypt-prf@0x7fe1080039c8 Mar 8 12:33:25.486753: | prf+N PRF sha2_256 update old_t-key@0x558b8d1caa60 (size 32) Mar 8 12:33:25.486764: | prf+N PRF sha2_256 update seed-key@0x558b8d1c1780 (size 112) Mar 8 12:33:25.486782: | prf+N PRF sha2_256 update N++-byte@0x5 (5) Mar 8 12:33:25.486786: | prf+N PRF sha2_256 final-key ... Mar 8 12:33:25.486805: | prf+N PRF sha2_256 final-key@0x558b8d1c9540 (size 32) Mar 8 12:33:25.486815: | prf+N PRF sha2_256 init key-key@0x558b8d1c7cd0 (size 32) Mar 8 12:33:25.486825: | prf+N PRF sha2_256 crypt-prf@0x7fe108003978 Mar 8 12:33:25.486828: | prf+N PRF sha2_256 update old_t-key@0x558b8d1c9540 (size 32) Mar 8 12:33:25.486840: | prf+N PRF sha2_256 update seed-key@0x558b8d1c1780 (size 112) Mar 8 12:33:25.486851: | prf+N PRF sha2_256 update N++-byte@0x6 (6) Mar 8 12:33:25.486855: | prf+N PRF sha2_256 final-key ... Mar 8 12:33:25.486874: | prf+N PRF sha2_256 final-key@0x558b8d1caa60 (size 32) Mar 8 12:33:25.486884: | prf+N PRF sha2_256 init key-key@0x558b8d1c7cd0 (size 32) Mar 8 12:33:25.486894: | prf+N PRF sha2_256 crypt-prf@0x7fe1080039c8 Mar 8 12:33:25.486897: | prf+N PRF sha2_256 update old_t-key@0x558b8d1caa60 (size 32) Mar 8 12:33:25.486909: | prf+N PRF sha2_256 update seed-key@0x558b8d1c1780 (size 112) Mar 8 12:33:25.486920: | prf+N PRF sha2_256 update N++-byte@0x7 (7) Mar 8 12:33:25.486924: | prf+N PRF sha2_256 final-key ... Mar 8 12:33:25.486943: | prf+N PRF sha2_256 final-key@0x558b8d1c9540 (size 32) Mar 8 12:33:25.487007: | NSS ikev2: finished computing individual keys for IKEv2 SA Mar 8 12:33:25.487013: | calc_skeyseed_v2 pointers: shared-key@0x558b8d1bff10, SK_d-key@0x558b8d1c7cd0, SK_ai-key@0x558b8d1c1780, SK_ar-key@0x558b8d1c9540, SK_ei-key@0x558b8d1caa60, SK_er-key@0x7fe108001830, SK_pi-key@0x7fe108009db0, SK_pr-key@0x7fe10800bb60 Mar 8 12:33:25.487016: | calc_skeyseed_v2 initiator salt Mar 8 12:33:25.487019: | Mar 8 12:33:25.487022: | calc_skeyseed_v2 responder salt Mar 8 12:33:25.487025: | Mar 8 12:33:25.487028: | calc_skeyseed_v2 SK_pi Mar 8 12:33:25.487031: | e9 6f 19 ee 57 77 b2 8f ff 4e de d2 e6 6a e9 04 Mar 8 12:33:25.487034: | 93 e1 97 cd ca 80 6e 65 ba c6 7e 02 ae 08 1f c4 Mar 8 12:33:25.487037: | calc_skeyseed_v2 SK_pr Mar 8 12:33:25.487040: | a7 39 e3 78 22 b8 15 68 65 af b2 e6 b9 ca 1e 60 Mar 8 12:33:25.487043: | 58 f7 04 b6 5e b0 d9 7d ec 7f 8f 26 31 e7 64 cc Mar 8 12:33:25.487047: | crypto helper 0 finished compute dh (V2); request ID 2 time elapsed 1687 usec Mar 8 12:33:25.487051: | crypto helper 0 sending results from work-order 2 for state #1 to event queue Mar 8 12:33:25.487054: | scheduling now-event sending helper answer for #1 Mar 8 12:33:25.487061: | crypto helper 0 waiting (nothing to do) Mar 8 12:33:25.487209: | suspending state #1 and saving MD Mar 8 12:33:25.487237: | #1 is busy; has a suspended MD Mar 8 12:33:25.487265: | processing: [RE]START state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in log_stf_suspend() at ikev2.c:2691) Mar 8 12:33:25.487291: | "vpn/1x1" #1 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:2763 Mar 8 12:33:25.487336: | processing: stop from xxx.xxx.xxx.45:500 (BACKGROUND) (in process_md() at demux.c:394) Mar 8 12:33:25.487406: | processing: stop state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in process_md() at demux.c:396) Mar 8 12:33:25.487435: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.487459: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.487484: | processing: resume connection "vpn/1x1" (in process_md() at demux.c:396) Mar 8 12:33:25.487509: | processing: stop connection "vpn/1x1" (in process_md() at demux.c:397) Mar 8 12:33:25.487629: | executing now-event sending helper answer for 1 Mar 8 12:33:25.487672: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.487699: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.487730: | processing: start state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in schedule_event_now_cb() at server.c:594) Mar 8 12:33:25.487792: | crypto helper 0 replies to request ID 2 Mar 8 12:33:25.487828: | calling continuation function 0x558b8b683a20 Mar 8 12:33:25.487863: | ikev2_parent_inR1outI2_continue for #1: calculating g^{xy}, sending I2 Mar 8 12:33:25.487922: | DH secret MODP2048@0x7fe110002968: transferring ownership from helper IKEv2 DH to state #1 Mar 8 12:33:25.488033: | creating state object #2 at 0x558b8d1d9f48 Mar 8 12:33:25.488071: | parent state #2: new => STATE_UNDEFINED(ignore) Mar 8 12:33:25.488097: | duplicating state object #1 "vpn/1x1" as #2 for IPSEC SA Mar 8 12:33:25.488123: | inserting state object #2 Mar 8 12:33:25.488149: | serialno list: inserting object 0x558b8d1d9f48 (state #2) entry 0x558b8d1da6f0 into list 0x558b8b96a840 (older 0x558b8d1d6860 newer 0x558b8d1d6860) Mar 8 12:33:25.488224: | serialno list: inserted object 0x558b8d1d9f48 (state #2) entry 0x558b8d1da6f0 (older 0x558b8d1d6860 newer 0x558b8b96a840) Mar 8 12:33:25.488262: | serialno list: list entry 0x558b8b96a840 is HEAD (older 0x558b8d1da6f0 newer 0x558b8d1d6860) Mar 8 12:33:25.488326: | serialno table: inserting object 0x558b8d1d9f48 (state #2) entry 0x558b8d1da710 into list 0x558b8b95d7a0 (older 0x558b8b95d7a0 newer 0x558b8b95d7a0) Mar 8 12:33:25.488363: | serialno table: inserted object 0x558b8d1d9f48 (state #2) entry 0x558b8d1da710 (older 0x558b8b95d7a0 newer 0x558b8b95d7a0) Mar 8 12:33:25.488395: | serialno table: list entry 0x558b8b95d7a0 is HEAD (older 0x558b8d1da710 newer 0x558b8d1da710) Mar 8 12:33:25.488455: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Mar 8 12:33:25.488507: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x558b8d1d5f28 Mar 8 12:33:25.488540: | ikev2_replace_delay() picked up half-open SA ike_life:60 Mar 8 12:33:25.488602: | event_schedule: new EVENT_SA_EXPIRE-pe@0x558b8d1d5f28 Mar 8 12:33:25.488639: | inserting event EVENT_SA_EXPIRE, timeout in 60.000 seconds for #1 Mar 8 12:33:25.488672: | parent state #1: STATE_PARENT_I1(half-open-ike) => STATE_PARENT_I2(open-ike) Mar 8 12:33:25.488750: | ignore states: 0 Mar 8 12:33:25.488782: | half-open-ike states: 0 Mar 8 12:33:25.488813: | open-ike states: 1 Mar 8 12:33:25.488837: | established-anonymous-ike states: 0 Mar 8 12:33:25.488862: | established-authenticated-ike states: 0 Mar 8 12:33:25.488886: | anonymous-ipsec states: 0 Mar 8 12:33:25.488944: | authenticated-ipsec states: 0 Mar 8 12:33:25.488979: | informational states: 0 Mar 8 12:33:25.489004: | unknown states: 0 Mar 8 12:33:25.489034: | category states: 1 count states: 1 Mar 8 12:33:25.489124: | **emit ISAKMP Message: Mar 8 12:33:25.489191: | initiator cookie: Mar 8 12:33:25.489227: | f2 47 10 8f 3c ec 3c 44 Mar 8 12:33:25.489259: | responder cookie: Mar 8 12:33:25.489284: | bf 96 78 8b a5 ae d9 70 Mar 8 12:33:25.489339: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Mar 8 12:33:25.489387: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Mar 8 12:33:25.489466: | exchange type: ISAKMP_v2_AUTH (0x23) Mar 8 12:33:25.489504: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Mar 8 12:33:25.489568: | message ID: 00 00 00 01 Mar 8 12:33:25.489604: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Mar 8 12:33:25.489665: | ***emit IKEv2 Encryption Payload: Mar 8 12:33:25.489715: | next payload type: ISAKMP_NEXT_v2IDi (0x23) Mar 8 12:33:25.489749: | flags: none (0x0) Mar 8 12:33:25.489807: | next payload type: previous 'ISAKMP Message' 'next payload type' matches 'IKEv2 Encryption Payload' (46:ISAKMP_NEXT_v2SK) Mar 8 12:33:25.489843: | next payload type: saving payload location 'IKEv2 Encryption Payload' 'next payload type' Mar 8 12:33:25.489880: | emitting 16 raw bytes of IV into IKEv2 Encryption Payload Mar 8 12:33:25.489955: | IV 21 de 1b 31 a4 31 9a b2 1e 38 ea 69 da 67 9f 7c Mar 8 12:33:25.489992: | IKEv2 CERT: send a certificate? Mar 8 12:33:25.490024: | IKEv2 CERT: policy does not have RSASIG: PSK Mar 8 12:33:25.490049: | IDr payload will NOT be sent Mar 8 12:33:25.490125: | hmac PRF sha2_256 init symkey-key@0x7fe108009db0 (size 32) Mar 8 12:33:25.490178: | hmac PRF sha2_256 crypt-prf@0x558b8d1d6ee8 Mar 8 12:33:25.490260: | *****emit IKEv2 Identification - Initiator - Payload: Mar 8 12:33:25.490324: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Mar 8 12:33:25.490360: | flags: none (0x0) Mar 8 12:33:25.490394: | ID type: ID_IPV4_ADDR (0x1) Mar 8 12:33:25.490468: | next payload type: previous 'IKEv2 Encryption Payload' 'next payload type' matches 'IKEv2 Identification - Initiator - Payload' (35:ISAKMP_NEXT_v2IDi) Mar 8 12:33:25.490504: | next payload type: saving payload location 'IKEv2 Identification - Initiator - Payload' 'next payload type' Mar 8 12:33:25.490535: | emitting 4 raw bytes of my identity into IKEv2 Identification - Initiator - Payload Mar 8 12:33:25.490606: | my identity 36 f7 2c 78 Mar 8 12:33:25.490645: | emitting length of IKEv2 Identification - Initiator - Payload: 12 Mar 8 12:33:25.490705: | idhash calc I2 01 00 00 00 36 f7 2c 78 Mar 8 12:33:25.490741: | hmac PRF sha2_256 update data-bytes@0x558b8b96b7d4 (length 8) Mar 8 12:33:25.490804: | hmac PRF sha2_256 final-bytes ... Mar 8 12:33:25.490854: | hmac PRF sha2_256 final-bytes@0x7ffc75e8ba40 (length 32) Mar 8 12:33:25.490932: "vpn/1x1" #1: sending INITIAL_CONTACT Mar 8 12:33:25.490968: | Adding a v2N Payload Mar 8 12:33:25.491028: | *****emit IKEv2 Notify Payload: Mar 8 12:33:25.491059: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) Mar 8 12:33:25.491140: | flags: none (0x0) Mar 8 12:33:25.491175: | Protocol ID: PROTO_v2_RESERVED (0x0) Mar 8 12:33:25.491205: | SPI size: 0 (0x0) Mar 8 12:33:25.491230: | Notify Message Type: v2N_INITIAL_CONTACT (0x4000) Mar 8 12:33:25.491287: | next payload type: setting 'IKEv2 Identification - Initiator - Payload' 'next payload type' to IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Mar 8 12:33:25.491334: | next payload type: saving payload location 'IKEv2 Notify Payload' 'next payload type' Mar 8 12:33:25.491367: | emitting 0 raw bytes of Notify data into IKEv2 Notify Payload Mar 8 12:33:25.491427: | Notify data Mar 8 12:33:25.491466: | emitting length of IKEv2 Notify Payload: 8 Mar 8 12:33:25.491492: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.491517: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.491542: | *****emit IKEv2 Authentication Payload: Mar 8 12:33:25.491620: | next payload type: ISAKMP_NEXT_v2SA (0x21) Mar 8 12:33:25.491656: | flags: none (0x0) Mar 8 12:33:25.491717: | auth method: IKEv2_AUTH_SHARED (0x2) Mar 8 12:33:25.491753: | next payload type: previous 'IKEv2 Notify Payload' 'next payload type' matches 'IKEv2 Authentication Payload' (39:ISAKMP_NEXT_v2AUTH) Mar 8 12:33:25.491784: | next payload type: saving payload location 'IKEv2 Authentication Payload' 'next payload type' Mar 8 12:33:25.491811: | ikev2_calculate_psk_sighash() called from STATE_PARENT_I2 to create PSK with authby=secret Mar 8 12:33:25.491871: | started looking for secret for xxx.xxx.xx.120->xxx.xxx.xxx.45 of kind PKK_PSK Mar 8 12:33:25.491918: | actually looking for secret for xxx.xxx.xx.120->xxx.xxx.xxx.45 of kind PKK_PSK Mar 8 12:33:25.491953: | line 2: key type PKK_PSK(xxx.xxx.xx.120) to type PKK_PSK Mar 8 12:33:25.492015: | 1: compared key %any to xxx.xxx.xx.120 / xxx.xxx.xxx.45 -> 2 Mar 8 12:33:25.492052: | 2: compared key (none) to xxx.xxx.xx.120 / xxx.xxx.xxx.45 -> 2 Mar 8 12:33:25.492079: | 3: compared key xxx.xxx.xxx.45 to xxx.xxx.xx.120 / xxx.xxx.xxx.45 -> 6 Mar 8 12:33:25.492141: | line 2: match=6 Mar 8 12:33:25.492188: | best_match 0>6 best=0x558b8d1a3458 (line=2) Mar 8 12:33:25.492215: | concluding with best_match=6 best=0x558b8d1a3458 (lineno=2) Mar 8 12:33:25.492279: | = prf(,"Key Pad for IKEv2") PRF sha2_256 init shared secret-chunk@0x558b8d1c99c8 (length 18) Mar 8 12:33:25.492349: | = prf(,"Key Pad for IKEv2") PRF sha2_256 crypt-prf@0x558b8d1d6028 Mar 8 12:33:25.492417: | = prf(,"Key Pad for IKEv2") PRF sha2_256 update Key Pad for IKEv2-bytes@0x558b8b700ef0 (length 17) Mar 8 12:33:25.492506: | = prf(,"Key Pad for IKEv2") PRF sha2_256 final-key ... Mar 8 12:33:25.492578: | = prf(,"Key Pad for IKEv2") PRF sha2_256 final-key@0x7fe1080080e0 (size 32) Mar 8 12:33:25.492644: | = prf(, ) PRF sha2_256 init -key@0x7fe1080080e0 (size 32) Mar 8 12:33:25.492731: | = prf(, ) PRF sha2_256 crypt-prf@0x558b8d1d6ee8 Mar 8 12:33:25.492822: | = prf(, ) PRF sha2_256 update first-packet-chunk@0x558b8d1a4fb8 (length 440) Mar 8 12:33:25.492867: | = prf(, ) PRF sha2_256 update nonce-chunk@0x558b8d1d7918 (length 64) Mar 8 12:33:25.492948: | = prf(, ) PRF sha2_256 update hash-bytes@0x7ffc75e8ba40 (length 32) Mar 8 12:33:25.492987: | = prf(, ) PRF sha2_256 final-bytes ... Mar 8 12:33:25.493026: | = prf(, ) PRF sha2_256 final-bytes@0x7ffc75e8b620 (length 32) Mar 8 12:33:25.493106: | inputs to hash1 (first packet) Mar 8 12:33:25.493138: | f2 47 10 8f 3c ec 3c 44 00 00 00 00 00 00 00 00 Mar 8 12:33:25.493168: | 21 20 22 08 00 00 00 00 00 00 01 b8 22 00 00 30 Mar 8 12:33:25.493193: | 00 00 00 2c 01 01 00 04 03 00 00 0c 01 00 00 0c Mar 8 12:33:25.493217: | 80 0e 01 00 03 00 00 08 02 00 00 05 03 00 00 08 Mar 8 12:33:25.493275: | 03 00 00 0c 00 00 00 08 04 00 00 0e 28 00 01 08 Mar 8 12:33:25.493314: | 00 0e 00 00 50 2f 9a 19 09 c3 5a aa 12 c1 e5 a3 Mar 8 12:33:25.493344: | 27 4f 84 73 0e 7d dc 85 eb d3 e0 67 6b 5e 3d a9 Mar 8 12:33:25.493378: | 31 59 9a 3b b6 c7 40 4d f9 78 48 06 e8 5d 89 b5 Mar 8 12:33:25.493444: | 43 40 b5 c0 29 d1 8f 96 f1 29 38 22 4c 55 ed bf Mar 8 12:33:25.493533: | b0 b3 d3 2b b3 f3 1d 7c 81 3e d8 03 b6 e2 ac d7 Mar 8 12:33:25.493571: | 23 a3 54 76 55 7e 0a 39 e4 c3 48 c0 d6 b0 7c ff Mar 8 12:33:25.493602: | 3c 9a 76 b0 19 f7 cb 1f 94 c9 10 85 ce 65 f7 d7 Mar 8 12:33:25.493626: | 5e a9 75 6c 29 4a 47 da 05 33 cf 83 71 54 01 30 Mar 8 12:33:25.493683: | 55 14 04 8d 92 fa 05 5b 46 7a 53 b6 f3 cc d8 80 Mar 8 12:33:25.493732: | 4d 61 2f 77 f4 a5 5d 12 d6 74 37 1d 05 ff b7 b3 Mar 8 12:33:25.493765: | ae 17 c7 e3 2b c1 58 c1 1b 63 0b b2 fa c9 c3 46 Mar 8 12:33:25.493822: | 10 ce be 07 a6 07 e6 14 5e 1b 84 fa 96 e7 39 10 Mar 8 12:33:25.493857: | 18 e8 20 92 5c 4c 12 df 3c bc 7b 3e 4e e9 03 2f Mar 8 12:33:25.493887: | 42 f2 18 b3 d9 f1 eb fa b2 f6 6c f6 76 02 da 9c Mar 8 12:33:25.493912: | e1 4a 39 c5 5c b0 b2 3e 7e c0 29 2e a0 90 28 fd Mar 8 12:33:25.493981: | 13 a6 19 37 01 9a be e0 7a e6 07 9b 54 33 59 32 Mar 8 12:33:25.494016: | 34 b5 fe d0 29 00 00 24 68 28 ec 36 c6 2c db 1e Mar 8 12:33:25.494047: | 51 66 5e 67 5e d9 fb 21 51 1a c5 83 12 0c ac f5 Mar 8 12:33:25.494103: | f7 bb 96 37 b1 55 f6 d8 29 00 00 08 00 00 40 2e Mar 8 12:33:25.494133: | 29 00 00 1c 00 00 40 04 1c f9 ef 66 ac 67 bf 7b Mar 8 12:33:25.494162: | ce a4 84 81 9b 92 bd 26 23 ee d4 f9 00 00 00 1c Mar 8 12:33:25.494187: | 00 00 40 05 c4 82 81 68 15 b5 fe ff 59 eb b2 14 Mar 8 12:33:25.494252: | ab f1 27 2f 13 52 35 09 Mar 8 12:33:25.494282: | create: initiator inputs to hash2 (responder nonce) Mar 8 12:33:25.494323: | bd 1c 7e a0 ac bc 86 fa ba bd 78 ea d8 b0 96 92 Mar 8 12:33:25.494355: | 7d e6 68 e3 cb 38 ae b0 e6 c6 35 d9 60 b3 39 05 Mar 8 12:33:25.494413: | ee 30 d5 9b f4 04 4a 3f 92 ac 22 e5 b8 b6 fd 3a Mar 8 12:33:25.494448: | e6 a4 22 c7 ef 7b da 9e 05 bd c7 a7 a9 16 ac ff Mar 8 12:33:25.494479: | idhash 48 2f 58 6b 76 af b4 1f 1f b4 4b 06 20 08 a8 fa Mar 8 12:33:25.494503: | idhash ad d2 7f f6 13 f4 6f 5a 19 ed af ad 62 94 13 27 Mar 8 12:33:25.494528: | emitting 32 raw bytes of PSK auth into IKEv2 Authentication Payload Mar 8 12:33:25.494603: | PSK auth f4 19 c6 90 ed be 71 a5 73 5b 7d 0c ac 60 57 b0 Mar 8 12:33:25.494639: | PSK auth 1c 5d ea 7f da 46 de 87 d6 14 ad c0 49 f9 d9 de Mar 8 12:33:25.494700: | emitting length of IKEv2 Authentication Payload: 40 Mar 8 12:33:25.494741: | getting first pending from state #1 Mar 8 12:33:25.494825: | netlink_get_spi: allocated 0x30e9365b for esp.0@xxx.xxx.xxx.92 Mar 8 12:33:25.494915: | constructing ESP/AH proposals with all DH removed for vpn/1x1 (IKE SA initiator emitting ESP/AH proposals) Mar 8 12:33:25.494952: | converting proposal AES_CBC_256-HMAC_SHA2_256_128-MODP2048 to ikev2 ... Mar 8 12:33:25.494988: | ... ikev2_proposal: 1:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Mar 8 12:33:25.495054: "vpn/1x1" #1: local ESP/AH proposals for vpn/1x1 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Mar 8 12:33:25.495105: | Emitting ikev2_proposals ... Mar 8 12:33:25.495167: | *****emit IKEv2 Security Association Payload: Mar 8 12:33:25.495203: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Mar 8 12:33:25.495233: | flags: none (0x0) Mar 8 12:33:25.495290: | next payload type: previous 'IKEv2 Authentication Payload' 'next payload type' matches 'IKEv2 Security Association Payload' (33:ISAKMP_NEXT_v2SA) Mar 8 12:33:25.495335: | next payload type: saving payload location 'IKEv2 Security Association Payload' 'next payload type' Mar 8 12:33:25.495375: | discarding DH=NONE Mar 8 12:33:25.495434: | ******emit IKEv2 Proposal Substructure Payload: Mar 8 12:33:25.495469: | last proposal: v2_PROPOSAL_LAST (0x0) Mar 8 12:33:25.495500: | prop #: 1 (0x1) Mar 8 12:33:25.495525: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Mar 8 12:33:25.495593: | spi size: 4 (0x4) Mar 8 12:33:25.495633: | # transforms: 3 (0x3) Mar 8 12:33:25.495664: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Mar 8 12:33:25.495689: | our spi 30 e9 36 5b Mar 8 12:33:25.495747: | *******emit IKEv2 Transform Substructure Payload: Mar 8 12:33:25.495783: | last transform: v2_TRANSFORM_NON_LAST (0x3) Mar 8 12:33:25.495812: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Mar 8 12:33:25.495838: | IKEv2 transform ID: AES_CBC (0xc) Mar 8 12:33:25.495908: | ********emit IKEv2 Attribute Substructure Payload: Mar 8 12:33:25.495944: | af+type: IKEv2_KEY_LENGTH (0x800e) Mar 8 12:33:25.495974: | length/value: 256 (0x100) Mar 8 12:33:25.496000: | emitting length of IKEv2 Transform Substructure Payload: 12 Mar 8 12:33:25.496058: | *******emit IKEv2 Transform Substructure Payload: Mar 8 12:33:25.496093: | last transform: v2_TRANSFORM_NON_LAST (0x3) Mar 8 12:33:25.496123: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Mar 8 12:33:25.496148: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Mar 8 12:33:25.496217: | emitting length of IKEv2 Transform Substructure Payload: 8 Mar 8 12:33:25.496253: | discarding DH=NONE Mar 8 12:33:25.496283: | *******emit IKEv2 Transform Substructure Payload: Mar 8 12:33:25.496308: | last transform: v2_TRANSFORM_LAST (0x0) Mar 8 12:33:25.496333: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Mar 8 12:33:25.496391: | IKEv2 transform ID: ESN_DISABLED (0x0) Mar 8 12:33:25.496427: | emitting length of IKEv2 Transform Substructure Payload: 8 Mar 8 12:33:25.496458: | emitting length of IKEv2 Proposal Substructure Payload: 40 Mar 8 12:33:25.496498: | emitting length of IKEv2 Security Association Payload: 44 Mar 8 12:33:25.496560: | *****emit IKEv2 Traffic Selector - Initiator - Payload: Mar 8 12:33:25.496596: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Mar 8 12:33:25.496627: | flags: none (0x0) Mar 8 12:33:25.496652: | number of TS: 1 (0x1) Mar 8 12:33:25.496711: | next payload type: previous 'IKEv2 Security Association Payload' 'next payload type' matches 'IKEv2 Traffic Selector - Initiator - Payload' (44:ISAKMP_NEXT_v2TSi) Mar 8 12:33:25.496746: | next payload type: saving payload location 'IKEv2 Traffic Selector - Initiator - Payload' 'next payload type' Mar 8 12:33:25.496777: | ******emit IKEv2 Traffic Selector: Mar 8 12:33:25.496837: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Mar 8 12:33:25.496871: | IP Protocol ID: 0 (0x0) Mar 8 12:33:25.496900: | start port: 0 (0x0) Mar 8 12:33:25.496930: | end port: 65535 (0xffff) Mar 8 12:33:25.497006: | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector Mar 8 12:33:25.497045: | ipv4 start 0a e1 42 50 Mar 8 12:33:25.497122: | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector Mar 8 12:33:25.497154: | ipv4 end 0a e1 42 5f Mar 8 12:33:25.497184: | emitting length of IKEv2 Traffic Selector: 16 Mar 8 12:33:25.497209: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Mar 8 12:33:25.497234: | *****emit IKEv2 Traffic Selector - Responder - Payload: Mar 8 12:33:25.497258: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Mar 8 12:33:25.497323: | flags: none (0x0) Mar 8 12:33:25.497365: | number of TS: 1 (0x1) Mar 8 12:33:25.497397: | next payload type: previous 'IKEv2 Traffic Selector - Initiator - Payload' 'next payload type' matches 'IKEv2 Traffic Selector - Responder - Payload' (45:ISAKMP_NEXT_v2TSr) Mar 8 12:33:25.497437: | next payload type: saving payload location 'IKEv2 Traffic Selector - Responder - Payload' 'next payload type' Mar 8 12:33:25.497478: | ******emit IKEv2 Traffic Selector: Mar 8 12:33:25.497545: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Mar 8 12:33:25.497581: | IP Protocol ID: 0 (0x0) Mar 8 12:33:25.497610: | start port: 0 (0x0) Mar 8 12:33:25.497666: | end port: 65535 (0xffff) Mar 8 12:33:25.497701: | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector Mar 8 12:33:25.497732: | ipv4 start 0a 03 bc 11 Mar 8 12:33:25.497757: | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector Mar 8 12:33:25.497827: | ipv4 end 0a 03 bc 11 Mar 8 12:33:25.497863: | emitting length of IKEv2 Traffic Selector: 16 Mar 8 12:33:25.497893: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Mar 8 12:33:25.497918: | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE Mar 8 12:33:25.497944: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.498003: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.498040: | ikev2_padup_pre_encrypt: adding 8 bytes of padding (last is padding-length) Mar 8 12:33:25.498070: | emitting 8 raw bytes of padding and length into cleartext Mar 8 12:33:25.498095: | padding and length 00 01 02 03 04 05 06 07 Mar 8 12:33:25.498120: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.498198: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.498234: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Mar 8 12:33:25.498296: | emitting length of IKEv2 Encryption Payload: 196 Mar 8 12:33:25.498331: | emitting length of ISAKMP Message: 224 Mar 8 12:33:25.498361: | construct_enc_iv: encryption IV/starting-variable: salt-size=0 wire-IV-size=16 block-size 16 Mar 8 12:33:25.498423: | construct_enc_iv: encryption IV/starting-variable: computed counter-size=0 Mar 8 12:33:25.498458: | encryption IV/starting-variable Mar 8 12:33:25.498488: | 21 de 1b 31 a4 31 9a b2 1e 38 ea 69 da 67 9f 7c Mar 8 12:33:25.498513: | data before encryption: Mar 8 12:33:25.498587: | 29 00 00 0c 01 00 00 00 36 f7 2c 78 27 00 00 08 Mar 8 12:33:25.498622: | 00 00 40 00 21 00 00 28 02 00 00 00 f4 19 c6 90 Mar 8 12:33:25.498651: | ed be 71 a5 73 5b 7d 0c ac 60 57 b0 1c 5d ea 7f Mar 8 12:33:25.498677: | da 46 de 87 d6 14 ad c0 49 f9 d9 de 2c 00 00 2c Mar 8 12:33:25.498747: | 00 00 00 28 01 03 04 03 30 e9 36 5b 03 00 00 0c Mar 8 12:33:25.498783: | 01 00 00 0c 80 0e 01 00 03 00 00 08 03 00 00 0c Mar 8 12:33:25.498813: | 00 00 00 08 05 00 00 00 2d 00 00 18 01 00 00 00 Mar 8 12:33:25.498870: | 07 00 00 10 00 00 ff ff 0a e1 42 50 0a e1 42 5f Mar 8 12:33:25.498904: | 00 00 00 18 01 00 00 00 07 00 00 10 00 00 ff ff Mar 8 12:33:25.498933: | 0a 03 bc 11 0a 03 bc 11 00 01 02 03 04 05 06 07 Mar 8 12:33:25.498959: | NSS ike_alg_nss_cbc: aes - enter Mar 8 12:33:25.499044: | NSS ike_alg_nss_cbc: aes - exit Mar 8 12:33:25.499087: | data after encryption: Mar 8 12:33:25.499146: | 6b c7 89 54 6f c8 d0 50 b5 56 e7 9c 4d 25 af 9a Mar 8 12:33:25.499186: | b6 95 ef 9c 2f cf 57 40 4f 9f 28 0a a0 c2 27 ca Mar 8 12:33:25.499216: | d3 c8 78 7c 26 24 ab 85 e7 0a 0a 4e 31 c9 ea 1c Mar 8 12:33:25.499273: | 97 5d a5 6c ea 03 07 14 54 4e 22 0b 72 3b 31 ec Mar 8 12:33:25.499326: | 0f 84 b3 78 63 28 f0 7d 73 e5 b1 16 b4 f1 9f ac Mar 8 12:33:25.499386: | e0 8f 85 0f 33 f4 e5 35 af 54 f3 27 98 57 01 f4 Mar 8 12:33:25.499421: | 8b 3c 6c c9 9b bd 49 de 4e 22 fb 88 ef c3 c4 7e Mar 8 12:33:25.499451: | 2f 9b 33 3b 4f b4 94 ce 75 48 3c 99 89 e4 7a eb Mar 8 12:33:25.499506: | 9a 86 fd 9c 8d 7f dd 50 20 d2 89 27 da bf 5d 2a Mar 8 12:33:25.499552: | bd 87 c5 72 21 b9 aa 92 0b f8 24 29 00 cc 81 44 Mar 8 12:33:25.499621: | hmac PRF sha2_256 init symkey-key@0x558b8d1c1780 (size 32) Mar 8 12:33:25.499673: | hmac PRF sha2_256 crypt-prf@0x558b8d1d80e8 Mar 8 12:33:25.499736: | hmac PRF sha2_256 update data-bytes@0x558b8b96b7a0 (length 208) Mar 8 12:33:25.499831: | hmac PRF sha2_256 final-bytes ... Mar 8 12:33:25.499870: | hmac PRF sha2_256 final-bytes@0x558b8b96b870 (length 32) Mar 8 12:33:25.499935: | data being hmac: f2 47 10 8f 3c ec 3c 44 bf 96 78 8b a5 ae d9 70 Mar 8 12:33:25.499969: | data being hmac: 2e 20 23 08 00 00 00 01 00 00 00 e0 23 00 00 c4 Mar 8 12:33:25.499998: | data being hmac: 21 de 1b 31 a4 31 9a b2 1e 38 ea 69 da 67 9f 7c Mar 8 12:33:25.500037: | data being hmac: 6b c7 89 54 6f c8 d0 50 b5 56 e7 9c 4d 25 af 9a Mar 8 12:33:25.500098: | data being hmac: b6 95 ef 9c 2f cf 57 40 4f 9f 28 0a a0 c2 27 ca Mar 8 12:33:25.500132: | data being hmac: d3 c8 78 7c 26 24 ab 85 e7 0a 0a 4e 31 c9 ea 1c Mar 8 12:33:25.500161: | data being hmac: 97 5d a5 6c ea 03 07 14 54 4e 22 0b 72 3b 31 ec Mar 8 12:33:25.500236: | data being hmac: 0f 84 b3 78 63 28 f0 7d 73 e5 b1 16 b4 f1 9f ac Mar 8 12:33:25.500273: | data being hmac: e0 8f 85 0f 33 f4 e5 35 af 54 f3 27 98 57 01 f4 Mar 8 12:33:25.500302: | data being hmac: 8b 3c 6c c9 9b bd 49 de 4e 22 fb 88 ef c3 c4 7e Mar 8 12:33:25.500326: | data being hmac: 2f 9b 33 3b 4f b4 94 ce 75 48 3c 99 89 e4 7a eb Mar 8 12:33:25.500350: | data being hmac: 9a 86 fd 9c 8d 7f dd 50 20 d2 89 27 da bf 5d 2a Mar 8 12:33:25.500373: | data being hmac: bd 87 c5 72 21 b9 aa 92 0b f8 24 29 00 cc 81 44 Mar 8 12:33:25.500440: | out calculated auth: Mar 8 12:33:25.500473: | 79 22 84 df 9f 16 c5 24 15 0c a4 9d 34 8d f4 4a Mar 8 12:33:25.500502: | processing: suspend state #1 connection "vpn/1x1" xxx.xxx.xxx.45 (in complete_v2_state_transition() at ikev2.c:2787) Mar 8 12:33:25.500535: | processing: start state #2 connection "vpn/1x1" xxx.xxx.xxx.45 (in complete_v2_state_transition() at ikev2.c:2787) Mar 8 12:33:25.500611: | #2 complete v2 state transition from STATE_UNDEFINED with STF_OK Mar 8 12:33:25.500646: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.500707: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.500742: | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 Mar 8 12:33:25.500772: | child state #2: STATE_UNDEFINED(ignore) => STATE_PARENT_I2(open-ike) Mar 8 12:33:25.500797: | ignore states: 0 Mar 8 12:33:25.500853: | half-open-ike states: 0 Mar 8 12:33:25.500887: | open-ike states: 2 Mar 8 12:33:25.500911: | established-anonymous-ike states: 0 Mar 8 12:33:25.500943: | established-authenticated-ike states: 0 Mar 8 12:33:25.500998: | anonymous-ipsec states: 0 Mar 8 12:33:25.501032: | authenticated-ipsec states: 0 Mar 8 12:33:25.501056: | informational states: 0 Mar 8 12:33:25.501086: | unknown states: 0 Mar 8 12:33:25.501141: | category states: 2 count states: 2 Mar 8 12:33:25.501178: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.501203: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.501235: | message ID #2 STATE_PARENT_I2 vpn/1x1 pst #1 st_msgid_nextuse(before=1) 2 st_msgid_lastack 0 st_msgid_lastrecv 4294967295 md is a resonse Mar 8 12:33:25.501302: "vpn/1x1" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=aes_256 integ=sha256_128 prf=sha2_256 group=MODP2048} Mar 8 12:33:25.501347: | sending V2 reply packet to xxx.xxx.xxx.45:500 (from port 500) Mar 8 12:33:25.501415: | sending 224 bytes for STATE_PARENT_I1 through eth0:500 to xxx.xxx.xxx.45:500 (using #1) Mar 8 12:33:25.501462: | f2 47 10 8f 3c ec 3c 44 bf 96 78 8b a5 ae d9 70 Mar 8 12:33:25.501545: | 2e 20 23 08 00 00 00 01 00 00 00 e0 23 00 00 c4 Mar 8 12:33:25.501580: | 21 de 1b 31 a4 31 9a b2 1e 38 ea 69 da 67 9f 7c Mar 8 12:33:25.501641: | 6b c7 89 54 6f c8 d0 50 b5 56 e7 9c 4d 25 af 9a Mar 8 12:33:25.501675: | b6 95 ef 9c 2f cf 57 40 4f 9f 28 0a a0 c2 27 ca Mar 8 12:33:25.501699: | d3 c8 78 7c 26 24 ab 85 e7 0a 0a 4e 31 c9 ea 1c Mar 8 12:33:25.501740: | 97 5d a5 6c ea 03 07 14 54 4e 22 0b 72 3b 31 ec Mar 8 12:33:25.501800: | 0f 84 b3 78 63 28 f0 7d 73 e5 b1 16 b4 f1 9f ac Mar 8 12:33:25.501829: | e0 8f 85 0f 33 f4 e5 35 af 54 f3 27 98 57 01 f4 Mar 8 12:33:25.501853: | 8b 3c 6c c9 9b bd 49 de 4e 22 fb 88 ef c3 c4 7e Mar 8 12:33:25.501876: | 2f 9b 33 3b 4f b4 94 ce 75 48 3c 99 89 e4 7a eb Mar 8 12:33:25.501921: | 9a 86 fd 9c 8d 7f dd 50 20 d2 89 27 da bf 5d 2a Mar 8 12:33:25.501955: | bd 87 c5 72 21 b9 aa 92 0b f8 24 29 00 cc 81 44 Mar 8 12:33:25.502043: | 79 22 84 df 9f 16 c5 24 15 0c a4 9d 34 8d f4 4a Mar 8 12:33:25.502133: | state #2 requesting to delete non existing event Mar 8 12:33:25.502213: | success_v2_state_transition scheduling EVENT_v2_RETRANSMIT of c->r_interval=500ms Mar 8 12:33:25.502246: | event_schedule: new EVENT_v2_RETRANSMIT-pe@0x558b8d1d8208 Mar 8 12:33:25.502291: | inserting event EVENT_v2_RETRANSMIT, timeout in 0.500 seconds for #2 Mar 8 12:33:25.502358: | #2 STATE_PARENT_I2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 16332.688 Mar 8 12:33:25.502453: | processing: stop state #2 connection "vpn/1x1" xxx.xxx.xxx.45 (in schedule_event_now_cb() at server.c:597) Mar 8 12:33:25.502485: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.502515: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.536954: | *received 80 bytes from xxx.xxx.xxx.45:500 on eth0 (port=500) Mar 8 12:33:25.537059: | f2 47 10 8f 3c ec 3c 44 bf 96 78 8b a5 ae d9 70 Mar 8 12:33:25.537091: | 2e 20 23 20 00 00 00 01 00 00 00 50 29 00 00 34 Mar 8 12:33:25.537136: | 5b ee 96 82 93 5b 2f bf e6 7e 0e c7 54 ee d1 80 Mar 8 12:33:25.537181: | 6b 4a 99 37 07 bb f6 d2 20 e4 d4 ae 09 f0 40 1c Mar 8 12:33:25.537234: | 3a 60 02 bb d4 28 5d 88 d0 fd 53 99 7e 26 2c 54 Mar 8 12:33:25.537278: | processing: start from xxx.xxx.xxx.45:500 (in process_md() at demux.c:392) Mar 8 12:33:25.537354: | **parse ISAKMP Message: Mar 8 12:33:25.537420: | initiator cookie: Mar 8 12:33:25.537469: | f2 47 10 8f 3c ec 3c 44 Mar 8 12:33:25.537506: | responder cookie: Mar 8 12:33:25.537582: | bf 96 78 8b a5 ae d9 70 Mar 8 12:33:25.537613: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Mar 8 12:33:25.537637: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Mar 8 12:33:25.537662: | exchange type: ISAKMP_v2_AUTH (0x23) Mar 8 12:33:25.537719: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Mar 8 12:33:25.537748: | message ID: 00 00 00 01 Mar 8 12:33:25.537779: | length: 80 (0x50) Mar 8 12:33:25.537819: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) Mar 8 12:33:25.537885: | I am receiving an IKEv2 Response ISAKMP_v2_AUTH Mar 8 12:33:25.537919: | I am the IKE SA Original Initiator Mar 8 12:33:25.537953: | cookies table: hash icookie f2 47 10 8f 3c ec 3c 44 rcookie bf 96 78 8b a5 ae d9 70 to 15471127888705261796 slot 0x558b8b958820 Mar 8 12:33:25.538025: | v2 peer, cookies and msgid match on #2 Mar 8 12:33:25.538061: | v2 state object #2 found, in STATE_PARENT_I2 Mar 8 12:33:25.538097: | found state #2 Mar 8 12:33:25.538124: | processing: start state #2 connection "vpn/1x1" xxx.xxx.xxx.45 (in ikev2_process_packet() at ikev2.c:1538) Mar 8 12:33:25.538187: | processing: start connection "vpn/1x1" (BACKGROUND) (in ikev2_process_packet() at ikev2.c:1543) Mar 8 12:33:25.538234: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.538295: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.538336: | #2 is idle Mar 8 12:33:25.538361: | #2 idle Mar 8 12:33:25.538420: | #2 in state PARENT_I2: sent v2I2, expected v2R2 Mar 8 12:33:25.538456: | Unpacking clear payload for svm: Initiator: process INVALID_SYNTAX AUTH notification Mar 8 12:33:25.538480: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Mar 8 12:33:25.538555: | ***parse IKEv2 Encryption Payload: Mar 8 12:33:25.538591: | next payload type: ISAKMP_NEXT_v2N (0x29) Mar 8 12:33:25.538615: | flags: none (0x0) Mar 8 12:33:25.538645: | length: 52 (0x34) Mar 8 12:33:25.538700: | processing payload: ISAKMP_NEXT_v2SK (len=52) Mar 8 12:33:25.538735: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.538759: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.538791: | hmac PRF sha2_256 init symkey-key@0x558b8d1c9540 (size 32) Mar 8 12:33:25.538897: | hmac PRF sha2_256 crypt-prf@0x558b8d1d6028 Mar 8 12:33:25.538967: | hmac PRF sha2_256 update data-bytes@0x558b8d1384b8 (length 64) Mar 8 12:33:25.539016: | hmac PRF sha2_256 final-bytes ... Mar 8 12:33:25.539091: | hmac PRF sha2_256 final-bytes@0x7ffc75e8b720 (length 32) Mar 8 12:33:25.539162: | data for hmac: f2 47 10 8f 3c ec 3c 44 bf 96 78 8b a5 ae d9 70 Mar 8 12:33:25.539197: | data for hmac: 2e 20 23 20 00 00 00 01 00 00 00 50 29 00 00 34 Mar 8 12:33:25.539226: | data for hmac: 5b ee 96 82 93 5b 2f bf e6 7e 0e c7 54 ee d1 80 Mar 8 12:33:25.539250: | data for hmac: 6b 4a 99 37 07 bb f6 d2 20 e4 d4 ae 09 f0 40 1c Mar 8 12:33:25.539290: | calculated auth: 3a 60 02 bb d4 28 5d 88 d0 fd 53 99 7e 26 2c 54 Mar 8 12:33:25.539351: | provided auth: 3a 60 02 bb d4 28 5d 88 d0 fd 53 99 7e 26 2c 54 Mar 8 12:33:25.539387: | authenticator matched Mar 8 12:33:25.539412: | construct_enc_iv: decryption IV/starting-variable: salt-size=0 wire-IV-size=16 block-size 16 Mar 8 12:33:25.539442: | construct_enc_iv: decryption IV/starting-variable: computed counter-size=0 Mar 8 12:33:25.539512: | decryption IV/starting-variable Mar 8 12:33:25.539547: | 5b ee 96 82 93 5b 2f bf e6 7e 0e c7 54 ee d1 80 Mar 8 12:33:25.539576: | payload before decryption: Mar 8 12:33:25.539631: | 6b 4a 99 37 07 bb f6 d2 20 e4 d4 ae 09 f0 40 1c Mar 8 12:33:25.539664: | NSS ike_alg_nss_cbc: aes - enter Mar 8 12:33:25.539704: | NSS ike_alg_nss_cbc: aes - exit Mar 8 12:33:25.539781: | payload after decryption: Mar 8 12:33:25.539849: | 00 00 00 08 01 00 00 18 00 00 00 00 00 00 00 07 Mar 8 12:33:25.539884: | stripping 8 octets as pad Mar 8 12:33:25.539914: | #2 ikev2 ISAKMP_v2_AUTH decrypt success Mar 8 12:33:25.539968: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Mar 8 12:33:25.540003: | **parse IKEv2 Notify Payload: Mar 8 12:33:25.540034: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Mar 8 12:33:25.540105: | flags: none (0x0) Mar 8 12:33:25.540140: | length: 8 (0x8) Mar 8 12:33:25.540170: | Protocol ID: PROTO_v2_IKE (0x1) Mar 8 12:33:25.540238: | SPI size: 0 (0x0) Mar 8 12:33:25.540275: | Notify Message Type: v2N_AUTHENTICATION_FAILED (0x18) Mar 8 12:33:25.540301: | processing payload: ISAKMP_NEXT_v2N (len=8) Mar 8 12:33:25.540325: | selected state microcode Initiator: process AUTHENTICATION_FAILED AUTH notification Mar 8 12:33:25.540349: | Now lets proceed with state specific processing Mar 8 12:33:25.540407: | calling processor Initiator: process AUTHENTICATION_FAILED AUTH notification Mar 8 12:33:25.540444: "vpn/1x1" #2: IKE SA authentication request rejected: AUTHENTICATION_FAILED Mar 8 12:33:25.540523: "vpn/1x1" #2: scheduling retry attempt 1 of an unlimited number Mar 8 12:33:25.540560: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.540594: | serialno table: hash serialno #1 to head 0x558b8b95d780 Mar 8 12:33:25.540622: | free_event_entry: release EVENT_v2_RETRANSMIT-pe@0x558b8d1d8208 Mar 8 12:33:25.540681: | event_schedule: new EVENT_v2_RETRANSMIT-pe@0x558b8d1d8208 Mar 8 12:33:25.540718: | inserting event EVENT_v2_RETRANSMIT, timeout in 59.961 seconds for #2 Mar 8 12:33:25.540751: "vpn/1x1" #2: STATE_PARENT_I2: suppressing retransmits; will wait 59.961 seconds for retry Mar 8 12:33:25.540827: | complete v2 state transition with STF_IGNORE Mar 8 12:33:25.540865: | processing: stop from xxx.xxx.xxx.45:500 (BACKGROUND) (in process_md() at demux.c:394) Mar 8 12:33:25.540898: | processing: stop state #2 connection "vpn/1x1" xxx.xxx.xxx.45 (in process_md() at demux.c:396) Mar 8 12:33:25.540960: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.540994: | serialno table: hash serialno #0 to head 0x558b8b95d760 Mar 8 12:33:25.541024: | processing: resume connection "vpn/1x1" (in process_md() at demux.c:396) Mar 8 12:33:25.541050: | processing: stop connection "vpn/1x1" (in process_md() at demux.c:397)