Host B before ipsec auto --up mytunnel on Host A: Oct 12 13:33:21: NSS DB directory: sql:/etc/ipsec.d Oct 12 13:33:21: NSS initialized Oct 12 13:33:21: libcap-ng support [disabled] Oct 12 13:33:21: FIPS HMAC integrity support [disabled] Oct 12 13:33:21: Linux audit support [disabled] Oct 12 13:33:21: Starting Pluto (Libreswan Version 3.15 XFRM(netkey) KLIPS NSS CURL(non-NSS)) pid:2077 Oct 12 13:33:21: core dump dir: /var/run/pluto Oct 12 13:33:21: secrets file: /etc/ipsec.secrets Oct 12 13:33:21: leak-detective disabled Oct 12 13:33:21: NSS crypto [enabled] Oct 12 13:33:21: XAUTH PAM support [disabled] Oct 12 13:33:21: NAT-Traversal support [enabled] Oct 12 13:33:21: | Initialize up libevent base Oct 12 13:33:21: | event_schedule called for 3600 seconds Oct 12 13:33:21: | event_schedule_tv called for about 3600 seconds and change Oct 12 13:33:21: | inserting event EVENT_REINIT_SECRET, timeout in 3600.000000 seconds Oct 12 13:33:21: | event_schedule called for 60 seconds Oct 12 13:33:21: | event_schedule_tv called for about 60 seconds and change Oct 12 13:33:21: | inserting event EVENT_PENDING_DDNS, timeout in 60.000000 seconds Oct 12 13:33:21: | event_schedule called for 120 seconds Oct 12 13:33:21: | event_schedule_tv called for about 120 seconds and change Oct 12 13:33:21: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000000 seconds Oct 12 13:33:21: | test_cbc_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x06a9214036b8a15b512e03d534120006" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd22b30/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CBC) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(AES_CBC 0x00001082) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "Single block msg" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Oct 12 13:33:21: | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a Oct 12 13:33:21: | decode_to_chunk: cipertext: : input "0xe353779c1079aeb82708942dbe77181a" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "Single block msg" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key passed Oct 12 13:33:21: | test_cbc_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0xc286696d887c9aa0611bbb3e2025a45a" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd22b30/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CBC) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(AES_CBC 0x00001082) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a Oct 12 13:33:21: | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a Oct 12 13:33:21: | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a Oct 12 13:33:21: | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 Oct 12 13:33:21: | decode_to_chunk: cipertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a Oct 12 13:33:21: | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key passed Oct 12 13:33:21: | test_cbc_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd22b30/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CBC) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(AES_CBC 0x00001082) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 Oct 12 13:33:21: | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 Oct 12 13:33:21: | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 Oct 12 13:33:21: | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 Oct 12 13:33:21: | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 Oct 12 13:33:21: | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 Oct 12 13:33:21: | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 Oct 12 13:33:21: | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 Oct 12 13:33:21: | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 Oct 12 13:33:21: | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 Oct 12 13:33:21: | decode_to_chunk: cipertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 Oct 12 13:33:21: | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 Oct 12 13:33:21: | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 Oct 12 13:33:21: | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 Oct 12 13:33:21: | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key passed Oct 12 13:33:21: | test_cbc_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x56e47a38c5598974bc46903dba290349" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd22b30/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CBC) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(AES_CBC 0x00001082) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa Oct 12 13:33:21: | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e Oct 12 13:33:21: | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad Oct 12 13:33:21: | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af Oct 12 13:33:21: | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf Oct 12 13:33:21: | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf Oct 12 13:33:21: | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df Oct 12 13:33:21: | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa Oct 12 13:33:21: | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e Oct 12 13:33:21: | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad Oct 12 13:33:21: | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa Oct 12 13:33:21: | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e Oct 12 13:33:21: | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad Oct 12 13:33:21: | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 Oct 12 13:33:21: | decode_to_chunk: cipertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa Oct 12 13:33:21: | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e Oct 12 13:33:21: | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad Oct 12 13:33:21: | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af Oct 12 13:33:21: | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf Oct 12 13:33:21: | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf Oct 12 13:33:21: | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key passed Oct 12 13:33:21: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok Oct 12 13:33:21: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd275f0/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CTR) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(AES_CTR 0x00001086) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key passed Oct 12 13:33:21: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd276b0/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CTR) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(AES_CTR 0x00001086) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Oct 12 13:33:21: | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Oct 12 13:33:21: | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key passed Oct 12 13:33:21: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd276b0/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CTR) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(AES_CTR 0x00001086) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | 20 21 22 23 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 Oct 12 13:33:21: | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 Oct 12 13:33:21: | 25 b2 07 2f Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 Oct 12 13:33:21: | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 Oct 12 13:33:21: | 25 b2 07 2f Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | 20 21 22 23 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key passed Oct 12 13:33:21: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed Oct 12 13:33:21: | 86 3d 06 cc fd b7 85 15 Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd276f0/24) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed Oct 12 13:33:21: | bytes: 86 3d 06 cc fd b7 85 15 Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(40) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(24) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CTR) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(40) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(24) type/mechanism(AES_CTR 0x00001086) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key passed Oct 12 13:33:21: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c Oct 12 13:33:21: | 67 8c 3d b8 e6 f6 a9 1a Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd276f0/24) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c Oct 12 13:33:21: | bytes: 67 8c 3d b8 e6 f6 a9 1a Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(40) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(24) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CTR) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(40) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(24) type/mechanism(AES_CTR 0x00001086) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f Oct 12 13:33:21: | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f Oct 12 13:33:21: | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key passed Oct 12 13:33:21: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b Oct 12 13:33:21: | f5 9b 60 a7 86 d3 e0 fe Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd276c0/24) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b Oct 12 13:33:21: | bytes: f5 9b 60 a7 86 d3 e0 fe Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(40) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(24) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CTR) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(40) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(24) type/mechanism(AES_CTR 0x00001086) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | 20 21 22 23 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 Oct 12 13:33:21: | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 Oct 12 13:33:21: | ab ee 09 35 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 Oct 12 13:33:21: | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 Oct 12 13:33:21: | ab ee 09 35 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | 20 21 22 23 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key passed Oct 12 13:33:21: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c Oct 12 13:33:21: | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd27750/32) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c Oct 12 13:33:21: | bytes: 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(48) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(32) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CTR) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(48) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(32) type/mechanism(AES_CTR 0x00001086) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key passed Oct 12 13:33:21: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 Oct 12 13:33:21: | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd27750/32) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 Oct 12 13:33:21: | bytes: c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(48) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(32) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CTR) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(48) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(32) type/mechanism(AES_CTR 0x00001086) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 Oct 12 13:33:21: | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 Oct 12 13:33:21: | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key passed Oct 12 13:33:21: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 Oct 12 13:33:21: | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd27750/32) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 Oct 12 13:33:21: | bytes: aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(48) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(32) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_CTR) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(48) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(32) type/mechanism(AES_CTR 0x00001086) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | 20 21 22 23 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa Oct 12 13:33:21: | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f Oct 12 13:33:21: | 1e c0 e6 b8 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa Oct 12 13:33:21: | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f Oct 12 13:33:21: | 1e c0 e6 b8 Oct 12 13:33:21: | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Oct 12 13:33:21: | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f Oct 12 13:33:21: | 20 21 22 23 Oct 12 13:33:21: | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 Oct 12 13:33:21: | do_aes_ctr: enter Oct 12 13:33:21: | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes Oct 12 13:33:21: | do_aes_ctr: exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: counter-block: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key passed Oct 12 13:33:21: ike_alg_register_enc(): Activating OAKLEY_AES_CTR: Ok Oct 12 13:33:21: | test_gcm_vector: enter Oct 12 13:33:21: | decode_to_chunk: key: input "0xcf063a34d4a9a76c2c86787d3f96db71" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd22b30/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_GCM) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(AES_GCM 0x00001087) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: salted IV: input "0x113b9785971864c83b01c787" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 Oct 12 13:33:21: | extract_chunk: salt: offset 0 length 4 Oct 12 13:33:21: | salt 11 3b 97 85 Oct 12 13:33:21: | extract_chunk: wire-IV: offset 4 length 8 Oct 12 13:33:21: | wire-IV 97 18 64 c8 3b 01 c7 87 Oct 12 13:33:21: | decode_to_chunk: AAD: input "" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | Oct 12 13:33:21: | decode_to_chunk: plaintext: input "" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | Oct 12 13:33:21: | decode_to_chunk: ciphertext: input "" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | Oct 12 13:33:21: | decode_to_chunk: tag: input "0x72ac8493e3a5228b5d130a69d2510e42" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 Oct 12 13:33:21: | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 Oct 12 13:33:21: | test_gcm_vector: text+tag on call Oct 12 13:33:21: | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 Oct 12 13:33:21: | test_gcm_vector: text+tag on return Oct 12 13:33:21: | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 Oct 12 13:33:21: | compare_chunk: output plaintext: ok Oct 12 13:33:21: | compare_chunk: TAG: ok Oct 12 13:33:21: | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 Oct 12 13:33:21: | test_gcm_vector: text+tag on call Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | test_gcm_vector: text+tag on return Oct 12 13:33:21: | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 Oct 12 13:33:21: | compare_chunk: output ciphertext: ok Oct 12 13:33:21: | compare_chunk: TAG: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_gcm_vector: passed Oct 12 13:33:21: | test_gcm_vector: enter Oct 12 13:33:21: | decode_to_chunk: key: input "0xe98b72a9881a84ca6b76e0f43e68647a" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd22b30/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_GCM) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(AES_GCM 0x00001087) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: salted IV: input "0x8b23299fde174053f3d652ba" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 8b 23 29 9f de 17 40 53 f3 d6 52 ba Oct 12 13:33:21: | extract_chunk: salt: offset 0 length 4 Oct 12 13:33:21: | salt 8b 23 29 9f Oct 12 13:33:21: | extract_chunk: wire-IV: offset 4 length 8 Oct 12 13:33:21: | wire-IV de 17 40 53 f3 d6 52 ba Oct 12 13:33:21: | decode_to_chunk: AAD: input "" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | Oct 12 13:33:21: | decode_to_chunk: plaintext: input "0x28286a321293253c3e0aa2704a278032" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 Oct 12 13:33:21: | decode_to_chunk: ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Oct 12 13:33:21: | decode_to_chunk: tag: input "0x23c7ab0f952b7091cd324835043b5eb5" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 Oct 12 13:33:21: | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 Oct 12 13:33:21: | test_gcm_vector: text+tag on call Oct 12 13:33:21: | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Oct 12 13:33:21: | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 Oct 12 13:33:21: | test_gcm_vector: text+tag on return Oct 12 13:33:21: | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 Oct 12 13:33:21: | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 Oct 12 13:33:21: | compare_chunk: output plaintext: ok Oct 12 13:33:21: | compare_chunk: TAG: ok Oct 12 13:33:21: | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 Oct 12 13:33:21: | test_gcm_vector: text+tag on call Oct 12 13:33:21: | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | test_gcm_vector: text+tag on return Oct 12 13:33:21: | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Oct 12 13:33:21: | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 Oct 12 13:33:21: | compare_chunk: output ciphertext: ok Oct 12 13:33:21: | compare_chunk: TAG: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_gcm_vector: passed Oct 12 13:33:21: | test_gcm_vector: enter Oct 12 13:33:21: | decode_to_chunk: key: input "0xbfd414a6212958a607a0f5d3ab48471d" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd275d0/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_GCM) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(AES_GCM 0x00001087) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 Oct 12 13:33:21: | extract_chunk: salt: offset 0 length 4 Oct 12 13:33:21: | salt 86 d8 ea 0a Oct 12 13:33:21: | extract_chunk: wire-IV: offset 4 length 8 Oct 12 13:33:21: | wire-IV b8 e4 0d cc 48 1c d0 e2 Oct 12 13:33:21: | decode_to_chunk: AAD: input "" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | Oct 12 13:33:21: | decode_to_chunk: plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 Oct 12 13:33:21: | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a Oct 12 13:33:21: | decode_to_chunk: ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c Oct 12 13:33:21: | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 Oct 12 13:33:21: | decode_to_chunk: tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e Oct 12 13:33:21: | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 Oct 12 13:33:21: | test_gcm_vector: text+tag on call Oct 12 13:33:21: | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c Oct 12 13:33:21: | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 Oct 12 13:33:21: | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e Oct 12 13:33:21: | test_gcm_vector: text+tag on return Oct 12 13:33:21: | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 Oct 12 13:33:21: | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a Oct 12 13:33:21: | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e Oct 12 13:33:21: | compare_chunk: output plaintext: ok Oct 12 13:33:21: | compare_chunk: TAG: ok Oct 12 13:33:21: | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 Oct 12 13:33:21: | test_gcm_vector: text+tag on call Oct 12 13:33:21: | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 Oct 12 13:33:21: | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | test_gcm_vector: text+tag on return Oct 12 13:33:21: | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c Oct 12 13:33:21: | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 Oct 12 13:33:21: | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e Oct 12 13:33:21: | compare_chunk: output ciphertext: ok Oct 12 13:33:21: | compare_chunk: TAG: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_gcm_vector: passed Oct 12 13:33:21: | test_gcm_vector: enter Oct 12 13:33:21: | decode_to_chunk: key: input "0x006c458100fc5f4d62949d2c833b82d1" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 6c 45 81 00 fc 5f 4d 62 94 9d 2c 83 3b 82 d1 Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd275d0/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 00 6c 45 81 00 fc 5f 4d 62 94 9d 2c 83 3b 82 d1 Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(AES_GCM) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(AES_GCM 0x00001087) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: salted IV: input "0xa4e9c4bc5725a21ff42c82b2" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | a4 e9 c4 bc 57 25 a2 1f f4 2c 82 b2 Oct 12 13:33:21: | extract_chunk: salt: offset 0 length 4 Oct 12 13:33:21: | salt a4 e9 c4 bc Oct 12 13:33:21: | extract_chunk: wire-IV: offset 4 length 8 Oct 12 13:33:21: | wire-IV 57 25 a2 1f f4 2c 82 b2 Oct 12 13:33:21: | decode_to_chunk: AAD: input "0x2efb14fb3657cdd6b9a8ff1a5f5a39b9" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 2e fb 14 fb 36 57 cd d6 b9 a8 ff 1a 5f 5a 39 b9 Oct 12 13:33:21: | decode_to_chunk: plaintext: input "0xf381d3bfbee0a879f7a4e17b623278cedd6978053dd313530a18f1a836100950" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce Oct 12 13:33:21: | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 Oct 12 13:33:21: | decode_to_chunk: ciphertext: input "0xf39b4db3542d8542fb73fd2d66be568f26d7f814b3f87d1eceac3dd09a8d697e" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f Oct 12 13:33:21: | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e Oct 12 13:33:21: | decode_to_chunk: tag: input "0x39f045cb23b698c925db134d56c5" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 Oct 12 13:33:21: | test_gcm_vector: decrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 Oct 12 13:33:21: | test_gcm_vector: text+tag on call Oct 12 13:33:21: | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f Oct 12 13:33:21: | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e Oct 12 13:33:21: | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 Oct 12 13:33:21: | test_gcm_vector: text+tag on return Oct 12 13:33:21: | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce Oct 12 13:33:21: | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 Oct 12 13:33:21: | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 Oct 12 13:33:21: | compare_chunk: output plaintext: ok Oct 12 13:33:21: | compare_chunk: TAG: ok Oct 12 13:33:21: | test_gcm_vector: encrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 Oct 12 13:33:21: | test_gcm_vector: text+tag on call Oct 12 13:33:21: | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce Oct 12 13:33:21: | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | test_gcm_vector: text+tag on return Oct 12 13:33:21: | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f Oct 12 13:33:21: | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e Oct 12 13:33:21: | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 Oct 12 13:33:21: | compare_chunk: output ciphertext: ok Oct 12 13:33:21: | compare_chunk: TAG: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_gcm_vector: passed Oct 12 13:33:21: ike_alg_register_enc(): Activating OAKLEY_AES_GCM_A: Ok Oct 12 13:33:21: ike_alg_register_enc(): Activating OAKLEY_AES_GCM_B: Ok Oct 12 13:33:21: ike_alg_register_enc(): Activating OAKLEY_AES_GCM_C: Ok Oct 12 13:33:21: ike_alg_register_hash(): Activating DISABLED-OAKLEY_AES_XCBC: Ok Oct 12 13:33:21: | test_cbc_vector: Camellia: 16 bytes with 128-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd27650/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(CAMELLIA_CBC) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(CAMELLIA_CBC 0x00000552) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c Oct 12 13:33:21: | decode_to_chunk: cipertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed Oct 12 13:33:21: | test_cbc_vector: Camellia: 16 bytes with 128-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd27650/16) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(16) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(CAMELLIA_CBC) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(32) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(16) type/mechanism(CAMELLIA_CBC 0x00000552) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 Oct 12 13:33:21: | decode_to_chunk: cipertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed Oct 12 13:33:21: | test_cbc_vector: Camellia: 16 bytes with 256-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd276d0/32) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(48) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(32) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(CAMELLIA_CBC) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(48) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(32) type/mechanism(CAMELLIA_CBC 0x00000552) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d Oct 12 13:33:21: | decode_to_chunk: cipertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed Oct 12 13:33:21: | test_cbc_vector: Camellia: 16 bytes with 256-bit key Oct 12 13:33:21: | decode_to_chunk: key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff Oct 12 13:33:21: | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 Oct 12 13:33:21: | ephemeral_key: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | tmp: merge symkey(0x7f5c1bd22d20) bytes(0x7f5c1bd276d0/32) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:33:21: | symkey: key(0x7f5c1bd22d20) length(16) type/mechanism(AES_KEY_GEN 0x00001080) Oct 12 13:33:21: | bytes: 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff Oct 12 13:33:21: | bytes: ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 Oct 12 13:33:21: | tmp: key(0x7f5c1bd25cd0) length(48) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(32) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(CAMELLIA_CBC) Oct 12 13:33:21: | symkey: key(0x7f5c1bd25cd0) length(48) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:33:21: | symkey: key(0x7f5c1bd24450) length(32) type/mechanism(CAMELLIA_CBC 0x00000552) Oct 12 13:33:21: | tmp:: free key 0x7f5c1bd25cd0 Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 Oct 12 13:33:21: | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - exit Oct 12 13:33:21: | compare_chunk: encrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:33:21: | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 Oct 12 13:33:21: | decode_to_chunk: cipertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 Oct 12 13:33:21: | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" Oct 12 13:33:21: | decode_to_chunk: output: Oct 12 13:33:21: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - enter Oct 12 13:33:21: | NSS ike_alg_nss_cbc: camellia - exit Oct 12 13:33:21: | compare_chunk: decrypt: ok Oct 12 13:33:21: | compare_chunk: updated CBC IV: ok Oct 12 13:33:21: | sym_key: free key 0x7f5c1bd24450 Oct 12 13:33:21: | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed Oct 12 13:33:21: ike_alg_register_enc(): Activating OAKLEY_CAMELLIA_CBC: Ok Oct 12 13:33:21: ike_alg_register_enc(): Activating OAKLEY_CAMELLIA_CTR: Ok Oct 12 13:33:21: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok Oct 12 13:33:21: ike_alg_register_hash(): Activating OAKLEY_SHA2_384: Ok Oct 12 13:33:21: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok Oct 12 13:33:21: starting up 1 crypto helpers Oct 12 13:33:21: started thread for crypto helper 0 (master fd 11) Oct 12 13:33:21: | setup helper callback for master fd 11 Oct 12 13:33:21: Using KLIPS IPsec interface code on 3.10.0-229.14.1.el7.x86_64 Oct 12 13:33:21: | process 2077 listening for PF_KEY_V2 on file descriptor 13 Oct 12 13:33:21: | kernel_alg_init() Oct 12 13:33:21: | finish_pfkey_msg: K_SADB_REGISTER message 1 for AH Oct 12 13:33:21: | 02 07 00 02 02 00 00 00 01 00 00 00 1d 08 00 00 Oct 12 13:33:21: | pfkey_get: K_SADB_REGISTER message 1 Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_AH: sadb_msg_len=5 sadb_supported_len=24 Oct 12 13:33:21: | kernel_alg_add(): satype=2, exttype=14, alg_id=3(ESP_3DES) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_AH: alg[0], exttype=14, satype=2, alg_id=3, alg_ivlen=0, alg_minbits=160, alg_maxbits=160, res=0, ret=1 Oct 12 13:33:21: | kernel_alg_add(): satype=2, exttype=14, alg_id=2(ESP_DES) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_AH: alg[1], exttype=14, satype=2, alg_id=2, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0, ret=1 Oct 12 13:33:21: | AH registered with kernel. Oct 12 13:33:21: | finish_pfkey_msg: K_SADB_REGISTER message 2 for ESP Oct 12 13:33:21: | 02 07 00 03 02 00 00 00 02 00 00 00 1d 08 00 00 Oct 12 13:33:21: | pfkey_get: K_SADB_REGISTER message 2 Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=21 sadb_supported_len=80 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=14, alg_id=252(ESP_SERPENT) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[0], exttype=14, satype=3, alg_id=252, alg_ivlen=0, alg_minbits=256, alg_maxbits=256, res=0, ret=1 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=14, alg_id=7(ESP_BLOWFISH) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[1], exttype=14, satype=3, alg_id=7, alg_ivlen=0, alg_minbits=512, alg_maxbits=512, res=0, ret=1 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=14, alg_id=6(ESP_CAST) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[2], exttype=14, satype=3, alg_id=6, alg_ivlen=0, alg_minbits=384, alg_maxbits=384, res=0, ret=1 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=14, alg_id=5(ESP_IDEA) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[3], exttype=14, satype=3, alg_id=5, alg_ivlen=0, alg_minbits=256, alg_maxbits=256, res=0, ret=1 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=14, alg_id=3(ESP_3DES) Oct 12 13:33:21: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=3 Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[4], exttype=14, satype=3, alg_id=3, alg_ivlen=0, alg_minbits=160, alg_maxbits=160, res=0, ret=0 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=14, alg_id=2(ESP_DES) Oct 12 13:33:21: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=2 Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[5], exttype=14, satype=3, alg_id=2, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0, ret=0 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=14, alg_id=9(ESP_DES_IV32) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[6], exttype=14, satype=3, alg_id=9, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0, ret=1 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=14, alg_id=3(ESP_3DES) Oct 12 13:33:21: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=3 Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[7], exttype=14, satype=3, alg_id=3, alg_ivlen=0, alg_minbits=160, alg_maxbits=160, res=0, ret=0 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=14, alg_id=2(ESP_DES) Oct 12 13:33:21: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=2 Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[8], exttype=14, satype=3, alg_id=2, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0, ret=0 Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=21 sadb_supported_len=72 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=15, alg_id=3(ESP_3DES) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[9], exttype=15, satype=3, alg_id=3, alg_ivlen=64, alg_minbits=192, alg_maxbits=192, res=0, ret=1 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=15, alg_id=6(ESP_CAST) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[10], exttype=15, satype=3, alg_id=6, alg_ivlen=64, alg_minbits=128, alg_maxbits=128, res=0, ret=1 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=15, alg_id=252(ESP_SERPENT) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[11], exttype=15, satype=3, alg_id=252, alg_ivlen=128, alg_minbits=128, alg_maxbits=256, res=0, ret=1 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=15, alg_id=253(ESP_TWOFISH) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[12], exttype=15, satype=3, alg_id=253, alg_ivlen=128, alg_minbits=128, alg_maxbits=256, res=0, ret=1 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=15, alg_id=12(ESP_AES) Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[13], exttype=15, satype=3, alg_id=12, alg_ivlen=128, alg_minbits=128, alg_maxbits=256, res=0, ret=1 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=15, alg_id=3(ESP_3DES) Oct 12 13:33:21: | kernel_alg_add(): discarding already setup satype=3, exttype=15, alg_id=3 Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[14], exttype=15, satype=3, alg_id=3, alg_ivlen=64, alg_minbits=192, alg_maxbits=192, res=0, ret=0 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=15, alg_id=12(ESP_AES) Oct 12 13:33:21: | kernel_alg_add(): discarding already setup satype=3, exttype=15, alg_id=12 Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[15], exttype=15, satype=3, alg_id=12, alg_ivlen=128, alg_minbits=128, alg_maxbits=256, res=0, ret=0 Oct 12 13:33:21: | kernel_alg_add(): satype=3, exttype=15, alg_id=3(ESP_3DES) Oct 12 13:33:21: | kernel_alg_add(): discarding already setup satype=3, exttype=15, alg_id=3 Oct 12 13:33:21: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[16], exttype=15, satype=3, alg_id=3, alg_ivlen=64, alg_minbits=168, alg_maxbits=168, res=0, ret=0 Oct 12 13:33:21: | ESP registered with kernel. Oct 12 13:33:21: | finish_pfkey_msg: K_SADB_REGISTER message 3 for IPCOMP Oct 12 13:33:21: | 02 07 00 0a 02 00 00 00 03 00 00 00 1d 08 00 00 Oct 12 13:33:21: | pfkey_get: K_SADB_REGISTER message 3 Oct 12 13:33:21: | IPCOMP registered with kernel. Oct 12 13:33:21: | finish_pfkey_msg: K_SADB_REGISTER message 4 for IPIP Oct 12 13:33:21: | 02 07 00 09 02 00 00 00 04 00 00 00 1d 08 00 00 Oct 12 13:33:21: | pfkey_get: K_SADB_REGISTER message 4 Oct 12 13:33:21: | IPIP registered with kernel. Oct 12 13:33:21: | event_schedule called for 20 seconds Oct 12 13:33:21: | event_schedule_tv called for about 20 seconds and change Oct 12 13:33:21: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000000 seconds Oct 12 13:33:21: | setup kernel fd callback Oct 12 13:33:21: | Could not change to legacy CRL directory '/etc/ipsec.d/crls': 2 No such file or directory Oct 12 13:33:21: | event_schedule called for 37599 seconds Oct 12 13:33:21: | event_schedule_tv called for about 37599 seconds and change Oct 12 13:33:21: | inserting event EVENT_LOG_DAILY, timeout in 37599.000000 seconds Oct 12 13:33:21: | Setting up events, loop start Oct 12 13:33:21: | status value returned by setting the priority of this thread (crypto helper 0) 22 Oct 12 13:33:21: | crypto helper 0 waiting on fd 12 Oct 12 13:33:22: | calling addconn helper using execve Oct 12 13:33:22: | Added new connection mytunnel with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW Oct 12 13:33:22: | certificate not loaded for this end Oct 12 13:33:22: | counting wild cards for 2001:470:dc8c:1000::28:60 is 0 Oct 12 13:33:22: | certificate not loaded for this end Oct 12 13:33:22: | counting wild cards for 2001:470:dc8c:1000::28:70 is 0 Oct 12 13:33:22: added connection description "mytunnel" Oct 12 13:33:22: | 2001:470:dc8c:1000::28:60<2001:470:dc8c:1000::28:60>...2001:470:dc8c:1000::28:70<2001:470:dc8c:1000::28:70> Oct 12 13:33:22: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW Oct 12 13:33:22: | Added new connection v6neighbor-hole-in with policy PFS+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+PASS+NEVER_NEGOTIATE Oct 12 13:33:22: | certificate not loaded for this end Oct 12 13:33:22: | counting wild cards for ::1 is 0 Oct 12 13:33:22: | certificate not loaded for this end Oct 12 13:33:22: | counting wild cards for %any is 0 Oct 12 13:33:22: added connection description "v6neighbor-hole-in" Oct 12 13:33:22: | ::/0===::1<::1>:58/34560...%any:58/34816===::/0 Oct 12 13:33:22: | ike_life: 0s; ipsec_life: 0s; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0; policy: PFS+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+PASS+NEVER_NEGOTIATE Oct 12 13:33:22: | Added new connection v6neighbor-hole-out with policy PFS+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+PASS+NEVER_NEGOTIATE Oct 12 13:33:22: | certificate not loaded for this end Oct 12 13:33:22: | counting wild cards for ::1 is 0 Oct 12 13:33:22: | certificate not loaded for this end Oct 12 13:33:22: | counting wild cards for %any is 0 Oct 12 13:33:22: added connection description "v6neighbor-hole-out" Oct 12 13:33:22: | ::/0===::1<::1>:58/34816...%any:58/34560===::/0 Oct 12 13:33:22: | ike_life: 0s; ipsec_life: 0s; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0; policy: PFS+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+PASS+NEVER_NEGOTIATE Oct 12 13:33:22: listening for IKE messages Oct 12 13:33:22: | Inspecting interface lo Oct 12 13:33:22: | found lo with address 127.0.0.1 Oct 12 13:33:22: | Inspecting interface eth0 Oct 12 13:33:22: | found eth0 with address 10.48.28.70 Oct 12 13:33:22: | Inspecting interface ipsec0 Oct 12 13:33:22: | found ipsec0 with address 10.48.28.70 Oct 12 13:33:22: adding interface ipsec0/eth0 10.48.28.70:500 Oct 12 13:33:22: | NAT-T KLIPS: calling nat_traversal_espinudp_socket Oct 12 13:33:22: | NAT-Traversal: Trying new style NAT-T Oct 12 13:33:22: | NAT-Traversal: ESPINUDP(2) setup succeeded for new style NAT-T family IPv4 Oct 12 13:33:22: adding interface ipsec0/eth0 10.48.28.70:4500 Oct 12 13:33:22: | IP interface lo 127.0.0.1 has no matching ipsec* interface -- ignored Oct 12 13:33:22: | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001 Oct 12 13:33:22: | found ipsec0 with address 2001:0470:dc8c:1000:0000:0000:0028:0070 Oct 12 13:33:22: | found eth0 with address 2001:0470:dc8c:1000:0000:0000:0028:0070 Oct 12 13:33:22: | found eth0 with address 2001:0470:dc8c:1000:5054:00ff:fe21:76b4 Oct 12 13:33:22: | IP interface eth0 2001:470:dc8c:1000:5054:ff:fe21:76b4 has no matching ipsec* interface -- ignored Oct 12 13:33:22: adding interface ipsec0/eth0 2001:470:dc8c:1000::28:70:500 Oct 12 13:33:22: | IP interface lo ::1 has no matching ipsec* interface -- ignored Oct 12 13:33:22: | connect_to_host_pair: 2001:470:dc8c:1000::28:70:500 2001:470:dc8c:1000::28:60:500 -> hp:none Oct 12 13:33:22: | setup callback for interface eth0:500 fd 19 Oct 12 13:33:22: | setup callback for interface eth0:4500 fd 18 Oct 12 13:33:22: | setup callback for interface eth0:500 fd 17 Oct 12 13:33:22: | certs and keys locked by 'free_preshared_secrets' Oct 12 13:33:22: | certs and keys unlocked by 'free_preshard_secrets' Oct 12 13:33:22: loading secrets from "/etc/ipsec.secrets" Oct 12 13:33:22: | id type added to secret(0x7f5c1bd2a5c0) PPK_PSK: 2001:470:dc8c:1000::28:60 Oct 12 13:33:22: | id type added to secret(0x7f5c1bd2a5c0) PPK_PSK: 2001:470:dc8c:1000::28:70 Oct 12 13:33:22: | Processing PSK at line 1: passed Oct 12 13:33:22: | certs and keys locked by 'process_secret' Oct 12 13:33:22: | certs and keys unlocked by 'process_secret' Oct 12 13:33:22: | processing connection "v6neighbor-hole-in" Oct 12 13:33:22: | processing connection "v6neighbor-hole-out" Oct 12 13:33:41: | handling event EVENT_SHUNT_SCAN Oct 12 13:33:41: | event_schedule called for 20 seconds Oct 12 13:33:41: | event_schedule_tv called for about 20 seconds and change Oct 12 13:33:41: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000000 seconds Oct 12 13:33:41: | scanning for shunt eroutes Host B after ipsec auto --up mytunnel on Host A: Oct 12 13:34:01: | handling event EVENT_SHUNT_SCAN Oct 12 13:34:01: | event_schedule called for 20 seconds Oct 12 13:34:01: | event_schedule_tv called for about 20 seconds and change Oct 12 13:34:01: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000000 seconds Oct 12 13:34:01: | scanning for shunt eroutes Oct 12 13:34:18: | *received 792 bytes from 2001:470:dc8c:1000::28:60:500 on eth0 (port=500) Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Oct 12 13:34:18: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Oct 12 13:34:18: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | 80 01 00 07 80 02 00 02 80 03 00 01 80 04 00 0e Oct 12 13:34:18: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Oct 12 13:34:18: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 01 Oct 12 13:34:18: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Oct 12 13:34:18: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 01 Oct 12 13:34:18: | 80 03 00 01 80 04 00 0e 80 0e 01 00 03 00 00 24 Oct 12 13:34:18: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Oct 12 13:34:18: | 80 02 00 01 80 03 00 01 80 04 00 0e 80 0e 00 80 Oct 12 13:34:18: | 03 00 00 20 04 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 0e Oct 12 13:34:18: | 03 00 00 20 05 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 0e Oct 12 13:34:18: | 03 00 00 24 06 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | 80 01 00 07 80 02 00 02 80 03 00 01 80 04 00 05 Oct 12 13:34:18: | 80 0e 01 00 03 00 00 24 07 01 00 00 80 0b 00 01 Oct 12 13:34:18: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 01 Oct 12 13:34:18: | 80 04 00 05 80 0e 00 80 03 00 00 24 08 01 00 00 Oct 12 13:34:18: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 01 Oct 12 13:34:18: | 80 03 00 01 80 04 00 05 80 0e 01 00 03 00 00 24 Oct 12 13:34:18: | 09 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Oct 12 13:34:18: | 80 02 00 01 80 03 00 01 80 04 00 05 80 0e 00 80 Oct 12 13:34:18: | 03 00 00 20 0a 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 05 Oct 12 13:34:18: | 03 00 00 20 0b 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 05 Oct 12 13:34:18: | 03 00 00 24 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | 80 01 00 07 80 02 00 02 80 03 00 01 80 04 00 02 Oct 12 13:34:18: | 80 0e 01 00 03 00 00 24 0d 01 00 00 80 0b 00 01 Oct 12 13:34:18: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 01 Oct 12 13:34:18: | 80 04 00 02 80 0e 00 80 03 00 00 24 0e 01 00 00 Oct 12 13:34:18: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 01 Oct 12 13:34:18: | 80 03 00 01 80 04 00 02 80 0e 01 00 03 00 00 24 Oct 12 13:34:18: | 0f 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Oct 12 13:34:18: | 80 02 00 01 80 03 00 01 80 04 00 02 80 0e 00 80 Oct 12 13:34:18: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 02 Oct 12 13:34:18: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 02 Oct 12 13:34:18: | 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc Oct 12 13:34:18: | 77 57 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 Oct 12 13:34:18: | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 14 4a 13 1c 81 Oct 12 13:34:18: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Oct 12 13:34:18: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Oct 12 13:34:18: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Oct 12 13:34:18: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Oct 12 13:34:18: | 7c fd b2 fc 68 b6 a4 48 Oct 12 13:34:18: | **parse ISAKMP Message: Oct 12 13:34:18: | initiator cookie: Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | responder cookie: Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 12 13:34:18: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 12 13:34:18: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 12 13:34:18: | flags: none (0x0) Oct 12 13:34:18: | message ID: 00 00 00 00 Oct 12 13:34:18: | length: 792 (0x318) Oct 12 13:34:18: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 12 13:34:18: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2opt: 0x2080 Oct 12 13:34:18: | ***parse ISAKMP Security Association Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_VID (0xd) Oct 12 13:34:18: | length: 644 (0x284) Oct 12 13:34:18: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 12 13:34:18: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080 Oct 12 13:34:18: | ***parse ISAKMP Vendor ID Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_VID (0xd) Oct 12 13:34:18: | length: 20 (0x14) Oct 12 13:34:18: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080 Oct 12 13:34:18: | ***parse ISAKMP Vendor ID Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_VID (0xd) Oct 12 13:34:18: | length: 20 (0x14) Oct 12 13:34:18: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080 Oct 12 13:34:18: | ***parse ISAKMP Vendor ID Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_VID (0xd) Oct 12 13:34:18: | length: 20 (0x14) Oct 12 13:34:18: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080 Oct 12 13:34:18: | ***parse ISAKMP Vendor ID Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_VID (0xd) Oct 12 13:34:18: | length: 20 (0x14) Oct 12 13:34:18: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080 Oct 12 13:34:18: | ***parse ISAKMP Vendor ID Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_VID (0xd) Oct 12 13:34:18: | length: 20 (0x14) Oct 12 13:34:18: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080 Oct 12 13:34:18: | ***parse ISAKMP Vendor ID Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | length: 20 (0x14) Oct 12 13:34:18: packet from 2001:470:dc8c:1000::28:60:500: received Vendor ID payload [Dead Peer Detection] Oct 12 13:34:18: packet from 2001:470:dc8c:1000::28:60:500: received Vendor ID payload [FRAGMENTATION] Oct 12 13:34:18: | quirks.qnat_traversal_vid set to=86 Oct 12 13:34:18: packet from 2001:470:dc8c:1000::28:60:500: received Vendor ID payload [RFC 3947] Oct 12 13:34:18: | Ignoring older NAT-T Vendor ID paylad [draft-ietf-ipsec-nat-t-ike-03] Oct 12 13:34:18: packet from 2001:470:dc8c:1000::28:60:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] Oct 12 13:34:18: | Ignoring older NAT-T Vendor ID paylad [draft-ietf-ipsec-nat-t-ike-02_n] Oct 12 13:34:18: packet from 2001:470:dc8c:1000::28:60:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] Oct 12 13:34:18: | Ignoring older NAT-T Vendor ID paylad [draft-ietf-ipsec-nat-t-ike-02] Oct 12 13:34:18: packet from 2001:470:dc8c:1000::28:60:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] Oct 12 13:34:18: | find_host_connection me=2001:470:dc8c:1000::28:70:500 him=2001:470:dc8c:1000::28:60:500 policy=IKEV1_ALLOW Oct 12 13:34:18: | find_host_pair: comparing 2001:470:dc8c:1000::28:70:500 to 2001:470:dc8c:1000::28:60:500 Oct 12 13:34:18: | find_host_pair_conn (find_host_connection): 2001:470:dc8c:1000::28:70:500 2001:470:dc8c:1000::28:60:500 -> hp:mytunnel Oct 12 13:34:18: | find_next_host_connection policy=IKEV1_ALLOW Oct 12 13:34:18: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW (mytunnel) Oct 12 13:34:18: | find_next_host_connection returns mytunnel Oct 12 13:34:18: | creating state object #1 at 0x7f5c1bd2bfe0 Oct 12 13:34:18: | parent state #1: new > STATE_UNDEFINED(ignore) Oct 12 13:34:18: | processing connection "mytunnel" Oct 12 13:34:18: | parent state #1: STATE_UNDEFINED(ignore) > STATE_MAIN_R0(half-open-ike) Oct 12 13:34:18: | ignore states: 0 Oct 12 13:34:18: | half-open-ike states: 1 Oct 12 13:34:18: | open-ike states: 0 Oct 12 13:34:18: | established-anonymous-ike states: 0 Oct 12 13:34:18: | established-authenticated-ike states: 0 Oct 12 13:34:18: | anonymous-ipsec states: 0 Oct 12 13:34:18: | authenticated-ipsec states: 0 Oct 12 13:34:18: | informational states: 0 Oct 12 13:34:18: | unknown states: 0 Oct 12 13:34:18: | category states: 1 count states: 1 Oct 12 13:34:18: | inserting state object #1 Oct 12 13:34:18: | finding hash chain in state hash table Oct 12 13:34:18: | ICOOKIE: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | RCOOKIE: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | found hash chain 7 Oct 12 13:34:18: | list 0x7f5c1b7ee280 first entry (nil) Oct 12 13:34:18: | inserted state 0x7f5c1bd2bfe0 entry 0x7f5c1bd2c648 next (nil) prev-next 0x7f5c1b7ee280 into list Oct 12 13:34:18: | updated next entry is (nil) Oct 12 13:34:18: | finding hash chain in icookie hash table Oct 12 13:34:18: | ICOOKIE: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | RCOOKIE: 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | found hash chain 28 Oct 12 13:34:18: | list 0x7f5c1b7ee448 first entry (nil) Oct 12 13:34:18: | inserted state 0x7f5c1bd2bfe0 entry 0x7f5c1bd2c660 next (nil) prev-next 0x7f5c1b7ee448 into list Oct 12 13:34:18: | updated next entry is (nil) Oct 12 13:34:18: | event_schedule called for 0 seconds Oct 12 13:34:18: | event_schedule_tv called for about 0 seconds and change Oct 12 13:34:18: | inserting event EVENT_SO_DISCARD, timeout in 0.000000 seconds for #1 Oct 12 13:34:18: | sender checking NAT-T: enabled and 86 Oct 12 13:34:18: | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC Oct 12 13:34:18: "mytunnel" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) Oct 12 13:34:18: "mytunnel" #1: responding to Main Mode Oct 12 13:34:18: | **emit ISAKMP Message: Oct 12 13:34:18: | initiator cookie: Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | responder cookie: Oct 12 13:34:18: | 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 12 13:34:18: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 12 13:34:18: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 12 13:34:18: | flags: none (0x0) Oct 12 13:34:18: | message ID: 00 00 00 00 Oct 12 13:34:18: | NAT-T VID detected, sending NAT-T VID Oct 12 13:34:18: | ***emit ISAKMP Security Association Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_VID (0xd) Oct 12 13:34:18: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 12 13:34:18: | ****parse IPsec DOI SIT: Oct 12 13:34:18: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 12 13:34:18: | ****parse ISAKMP Proposal Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | length: 632 (0x278) Oct 12 13:34:18: | proposal number: 0 (0x0) Oct 12 13:34:18: | protocol ID: PROTO_ISAKMP (0x1) Oct 12 13:34:18: | SPI size: 0 (0x0) Oct 12 13:34:18: | number of transforms: 18 (0x12) Oct 12 13:34:18: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_T (0x3) Oct 12 13:34:18: | length: 36 (0x24) Oct 12 13:34:18: | ISAKMP transform number: 0 (0x0) Oct 12 13:34:18: | ISAKMP transform ID: KEY_IKE (0x1) Oct 12 13:34:18: | ******parse ISAKMP Oakley attribute: Oct 12 13:34:18: | af+type: OAKLEY_LIFE_TYPE (0x800b) Oct 12 13:34:18: | length/value: 1 (0x1) Oct 12 13:34:18: | [1 is OAKLEY_LIFE_SECONDS] Oct 12 13:34:18: | ******parse ISAKMP Oakley attribute: Oct 12 13:34:18: | af+type: OAKLEY_LIFE_DURATION (0x800c) Oct 12 13:34:18: | length/value: 3600 (0xe10) Oct 12 13:34:18: | ******parse ISAKMP Oakley attribute: Oct 12 13:34:18: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 12 13:34:18: | length/value: 7 (0x7) Oct 12 13:34:18: | [7 is OAKLEY_AES_CBC] Oct 12 13:34:18: | ike_alg_enc_ok(ealg=7,key_len=0): blocksize=16, keyminlen=128, keydeflen=128, keymaxlen=256, ret=1 Oct 12 13:34:18: | ******parse ISAKMP Oakley attribute: Oct 12 13:34:18: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Oct 12 13:34:18: | length/value: 2 (0x2) Oct 12 13:34:18: | [2 is OAKLEY_SHA1] Oct 12 13:34:18: | ******parse ISAKMP Oakley attribute: Oct 12 13:34:18: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Oct 12 13:34:18: | length/value: 1 (0x1) Oct 12 13:34:18: | [1 is OAKLEY_PRESHARED_KEY] Oct 12 13:34:18: | started looking for secret for 2001:470:dc8c:1000::28:70->2001:470:dc8c:1000::28:60 of kind PPK_PSK Oct 12 13:34:18: | actually looking for secret for 2001:470:dc8c:1000::28:70->2001:470:dc8c:1000::28:60 of kind PPK_PSK Oct 12 13:34:18: | line 1: key type PPK_PSK(2001:470:dc8c:1000::28:70) to type PPK_PSK Oct 12 13:34:18: | 1: compared key 2001:470:dc8c:1000::28:70 to 2001:470:dc8c:1000::28:70 / 2001:470:dc8c:1000::28:60 -> 8 Oct 12 13:34:18: | 2: compared key 2001:470:dc8c:1000::28:60 to 2001:470:dc8c:1000::28:70 / 2001:470:dc8c:1000::28:60 -> 12 Oct 12 13:34:18: | line 1: match=12 Oct 12 13:34:18: | best_match 0>12 best=0x7f5c1bd2a5c0 (line=1) Oct 12 13:34:18: | concluding with best_match=12 best=0x7f5c1bd2a5c0 (lineno=1) Oct 12 13:34:18: | ******parse ISAKMP Oakley attribute: Oct 12 13:34:18: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Oct 12 13:34:18: | length/value: 14 (0xe) Oct 12 13:34:18: | [14 is OAKLEY_GROUP_MODP2048] Oct 12 13:34:18: | ******parse ISAKMP Oakley attribute: Oct 12 13:34:18: | af+type: OAKLEY_KEY_LENGTH (0x800e) Oct 12 13:34:18: | length/value: 256 (0x100) Oct 12 13:34:18: | ike_alg_enc_ok(ealg=7,key_len=256): blocksize=16, keyminlen=128, keydeflen=128, keymaxlen=256, ret=1 Oct 12 13:34:18: | Oakley Transform 0 accepted Oct 12 13:34:18: | ****emit IPsec DOI SIT: Oct 12 13:34:18: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 12 13:34:18: | ****emit ISAKMP Proposal Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | proposal number: 0 (0x0) Oct 12 13:34:18: | protocol ID: PROTO_ISAKMP (0x1) Oct 12 13:34:18: | SPI size: 0 (0x0) Oct 12 13:34:18: | number of transforms: 1 (0x1) Oct 12 13:34:18: | *****emit ISAKMP Transform Payload (ISAKMP): Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | ISAKMP transform number: 0 (0x0) Oct 12 13:34:18: | ISAKMP transform ID: KEY_IKE (0x1) Oct 12 13:34:18: | emitting 28 raw bytes of attributes into ISAKMP Transform Payload (ISAKMP) Oct 12 13:34:18: | attributes 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Oct 12 13:34:18: | attributes 80 03 00 01 80 04 00 0e 80 0e 01 00 Oct 12 13:34:18: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Oct 12 13:34:18: | emitting length of ISAKMP Proposal Payload: 44 Oct 12 13:34:18: | emitting length of ISAKMP Security Association Payload: 56 Oct 12 13:34:18: | out_vid(): sending [Dead Peer Detection] Oct 12 13:34:18: | ***emit ISAKMP Vendor ID Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_VID (0xd) Oct 12 13:34:18: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Oct 12 13:34:18: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 Oct 12 13:34:18: | emitting length of ISAKMP Vendor ID Payload: 20 Oct 12 13:34:18: | out_vid(): sending [FRAGMENTATION] Oct 12 13:34:18: | ***emit ISAKMP Vendor ID Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_VID (0xd) Oct 12 13:34:18: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Oct 12 13:34:18: | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 Oct 12 13:34:18: | emitting length of ISAKMP Vendor ID Payload: 20 Oct 12 13:34:18: | out_vid(): sending [RFC 3947] Oct 12 13:34:18: | ***emit ISAKMP Vendor ID Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Oct 12 13:34:18: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f Oct 12 13:34:18: | emitting length of ISAKMP Vendor ID Payload: 20 Oct 12 13:34:18: | no IKEv1 message padding required Oct 12 13:34:18: | emitting length of ISAKMP Message: 144 Oct 12 13:34:18: | complete v1 state transition with STF_OK Oct 12 13:34:18: "mytunnel" #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 Oct 12 13:34:18: | peer supports fragmentation Oct 12 13:34:18: | peer supports dpd Oct 12 13:34:18: | parent state #1: STATE_MAIN_R0(half-open-ike) > STATE_MAIN_R1(open-ike) Oct 12 13:34:18: | ignore states: 0 Oct 12 13:34:18: | half-open-ike states: 0 Oct 12 13:34:18: | open-ike states: 1 Oct 12 13:34:18: | established-anonymous-ike states: 0 Oct 12 13:34:18: | established-authenticated-ike states: 0 Oct 12 13:34:18: | anonymous-ipsec states: 0 Oct 12 13:34:18: | authenticated-ipsec states: 0 Oct 12 13:34:18: | informational states: 0 Oct 12 13:34:18: | unknown states: 0 Oct 12 13:34:18: | category states: 1 count states: 1 Oct 12 13:34:18: | state: #1 requesting EVENT_SO_DISCARD to be deleted Oct 12 13:34:18: | sending reply packet to 2001:470:dc8c:1000::28:60:500 (from port 500) Oct 12 13:34:18: | sending 144 bytes for STATE_MAIN_R0 through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #1) Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | 01 10 02 00 00 00 00 00 00 00 00 90 0d 00 00 38 Oct 12 13:34:18: | 00 00 00 01 00 00 00 01 00 00 00 2c 00 01 00 01 Oct 12 13:34:18: | 00 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | 80 01 00 07 80 02 00 02 80 03 00 01 80 04 00 0e Oct 12 13:34:18: | 80 0e 01 00 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Oct 12 13:34:18: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 40 48 b7 d5 Oct 12 13:34:18: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 00 00 00 14 Oct 12 13:34:18: | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f Oct 12 13:34:18: | event_schedule_ms called for about 500 ms Oct 12 13:34:18: | event_schedule_tv called for about 0 seconds and change Oct 12 13:34:18: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500000 seconds for #1 Oct 12 13:34:18: "mytunnel" #1: STATE_MAIN_R1: sent MR1, expecting MI2 Oct 12 13:34:18: | modecfg pull: noquirk policy:push not-client Oct 12 13:34:18: | phase 1 is done, looking for phase 2 to unpend Oct 12 13:34:18: | *received 356 bytes from 2001:470:dc8c:1000::28:60:500 on eth0 (port=500) Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | 04 10 02 00 00 00 00 00 00 00 01 64 0a 00 01 04 Oct 12 13:34:18: | 87 c1 ce 29 10 67 b4 ba 58 3c 04 cc e4 01 7d db Oct 12 13:34:18: | 2a 3e e2 eb 5d 12 6c da 7a 45 ca 38 f2 02 23 d8 Oct 12 13:34:18: | f8 54 9c b8 e2 1e 9b 86 e6 60 47 f7 9e ff 20 ed Oct 12 13:34:18: | 54 d8 22 25 55 a4 1e 6c 3f 2a 7a 97 16 7c 43 df Oct 12 13:34:18: | f0 18 59 7e a0 d8 ba a3 9b c0 e4 88 a9 dd 40 2f Oct 12 13:34:18: | fb 6d 77 2f 62 c5 0f 89 4f 48 ba 52 c5 20 08 eb Oct 12 13:34:18: | 15 02 f6 78 32 21 44 79 2a 6e 61 b5 c8 44 f7 79 Oct 12 13:34:18: | 4e be 95 27 94 f2 af 65 c2 aa a7 49 49 b2 f6 69 Oct 12 13:34:18: | 14 10 c4 ad 2f d3 c0 37 12 56 c0 24 20 5b e6 2c Oct 12 13:34:18: | af 73 54 9e b3 71 b5 8b cb 5c 63 87 9f 68 5f 1d Oct 12 13:34:18: | 95 04 7f d9 5c b5 86 4e ab fc 7e ea 29 2f 01 40 Oct 12 13:34:18: | d1 8f ed e4 6e fa 6d bb c2 cd 5c 3d f3 ca ad 81 Oct 12 13:34:18: | 04 98 8d 7d 0b a2 9a 88 b0 c4 76 19 43 d5 f8 4d Oct 12 13:34:18: | 51 81 ba 72 e8 29 5f a0 a5 e2 74 ae dd a3 ad 41 Oct 12 13:34:18: | 0f 10 23 48 ae 80 d7 87 3f 76 ac 74 64 b6 ad b8 Oct 12 13:34:18: | 26 9e 03 b4 8b 3c a4 fe b2 96 88 3b 02 9f 7b 9b Oct 12 13:34:18: | 14 00 00 14 ea cd 80 8d 0e 37 3f 3d 2c 7e a8 97 Oct 12 13:34:18: | c9 b4 c8 85 14 00 00 18 77 89 fc 0c ce 0d 31 de Oct 12 13:34:18: | 73 c3 f2 3d db 2f ba ba e2 d2 f4 2a 00 00 00 18 Oct 12 13:34:18: | 58 9d cb 74 cf 54 5a 04 52 de 27 b6 ef 1c 95 65 Oct 12 13:34:18: | b5 36 77 09 Oct 12 13:34:18: | **parse ISAKMP Message: Oct 12 13:34:18: | initiator cookie: Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | responder cookie: Oct 12 13:34:18: | 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_KE (0x4) Oct 12 13:34:18: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 12 13:34:18: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 12 13:34:18: | flags: none (0x0) Oct 12 13:34:18: | message ID: 00 00 00 00 Oct 12 13:34:18: | length: 356 (0x164) Oct 12 13:34:18: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 12 13:34:18: | finding hash chain in state hash table Oct 12 13:34:18: | ICOOKIE: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | RCOOKIE: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | found hash chain 7 Oct 12 13:34:18: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000 Oct 12 13:34:18: | v1 state object #1 found, in STATE_MAIN_R1 Oct 12 13:34:18: | processing connection "mytunnel" Oct 12 13:34:18: | #1 state_busy:2221 st != NULL && st->st_calculating == FALSE; Oct 12 13:34:18: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410opt: 0x102080 Oct 12 13:34:18: | ***parse ISAKMP Key Exchange Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONCE (0xa) Oct 12 13:34:18: | length: 260 (0x104) Oct 12 13:34:18: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x102080 Oct 12 13:34:18: | ***parse ISAKMP Nonce Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Oct 12 13:34:18: | length: 20 (0x14) Oct 12 13:34:18: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Oct 12 13:34:18: | ***parse ISAKMP NAT-D Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Oct 12 13:34:18: | length: 24 (0x18) Oct 12 13:34:18: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Oct 12 13:34:18: | ***parse ISAKMP NAT-D Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | length: 24 (0x18) Oct 12 13:34:18: | DH public value received: Oct 12 13:34:18: | 87 c1 ce 29 10 67 b4 ba 58 3c 04 cc e4 01 7d db Oct 12 13:34:18: | 2a 3e e2 eb 5d 12 6c da 7a 45 ca 38 f2 02 23 d8 Oct 12 13:34:18: | f8 54 9c b8 e2 1e 9b 86 e6 60 47 f7 9e ff 20 ed Oct 12 13:34:18: | 54 d8 22 25 55 a4 1e 6c 3f 2a 7a 97 16 7c 43 df Oct 12 13:34:18: | f0 18 59 7e a0 d8 ba a3 9b c0 e4 88 a9 dd 40 2f Oct 12 13:34:18: | fb 6d 77 2f 62 c5 0f 89 4f 48 ba 52 c5 20 08 eb Oct 12 13:34:18: | 15 02 f6 78 32 21 44 79 2a 6e 61 b5 c8 44 f7 79 Oct 12 13:34:18: | 4e be 95 27 94 f2 af 65 c2 aa a7 49 49 b2 f6 69 Oct 12 13:34:18: | 14 10 c4 ad 2f d3 c0 37 12 56 c0 24 20 5b e6 2c Oct 12 13:34:18: | af 73 54 9e b3 71 b5 8b cb 5c 63 87 9f 68 5f 1d Oct 12 13:34:18: | 95 04 7f d9 5c b5 86 4e ab fc 7e ea 29 2f 01 40 Oct 12 13:34:18: | d1 8f ed e4 6e fa 6d bb c2 cd 5c 3d f3 ca ad 81 Oct 12 13:34:18: | 04 98 8d 7d 0b a2 9a 88 b0 c4 76 19 43 d5 f8 4d Oct 12 13:34:18: | 51 81 ba 72 e8 29 5f a0 a5 e2 74 ae dd a3 ad 41 Oct 12 13:34:18: | 0f 10 23 48 ae 80 d7 87 3f 76 ac 74 64 b6 ad b8 Oct 12 13:34:18: | 26 9e 03 b4 8b 3c a4 fe b2 96 88 3b 02 9f 7b 9b Oct 12 13:34:18: | checking NAT-t: enabled and RFC 3947 (NAT-Traversal) Oct 12 13:34:18: | natd_hash: hasher=0x7f5c1b7ee080(20) Oct 12 13:34:18: | natd_hash: icookie= 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | natd_hash: rcookie= 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | natd_hash: port=500 Oct 12 13:34:18: | natd_hash: hash= 77 89 fc 0c ce 0d 31 de 73 c3 f2 3d db 2f ba ba Oct 12 13:34:18: | natd_hash: hash= e2 d2 f4 2a Oct 12 13:34:18: | natd_hash: hasher=0x7f5c1b7ee080(20) Oct 12 13:34:18: | natd_hash: icookie= 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | natd_hash: rcookie= 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | natd_hash: port=500 Oct 12 13:34:18: | natd_hash: hash= 58 9d cb 74 cf 54 5a 04 52 de 27 b6 ef 1c 95 65 Oct 12 13:34:18: | natd_hash: hash= b5 36 77 09 Oct 12 13:34:18: | expected NAT-D(me): 77 89 fc 0c ce 0d 31 de 73 c3 f2 3d db 2f ba ba Oct 12 13:34:18: | expected NAT-D(me): e2 d2 f4 2a Oct 12 13:34:18: | expected NAT-D(him): Oct 12 13:34:18: | 58 9d cb 74 cf 54 5a 04 52 de 27 b6 ef 1c 95 65 Oct 12 13:34:18: | b5 36 77 09 Oct 12 13:34:18: | received NAT-D: 77 89 fc 0c ce 0d 31 de 73 c3 f2 3d db 2f ba ba Oct 12 13:34:18: | received NAT-D: e2 d2 f4 2a Oct 12 13:34:18: | received NAT-D: 58 9d cb 74 cf 54 5a 04 52 de 27 b6 ef 1c 95 65 Oct 12 13:34:18: | received NAT-D: b5 36 77 09 Oct 12 13:34:18: | NAT_TRAVERSAL nat_keepalive enabled 2001:470:dc8c:1000::28:60 Oct 12 13:34:18: "mytunnel" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected Oct 12 13:34:18: | NAT_T_WITH_KA detected Oct 12 13:34:18: | event_schedule called for 20 seconds Oct 12 13:34:18: | event_schedule_tv called for about 20 seconds and change Oct 12 13:34:18: | inserting event EVENT_NAT_T_KEEPALIVE, timeout in 20.000000 seconds Oct 12 13:34:18: | crypto helper 0: pcw_work: 0 Oct 12 13:34:18: | asking crypto helper 0 to do build KE and nonce; request ID 1 (len=2776, pcw_work=0) Oct 12 13:34:18: | #1 send_crypto_helper_request:613 st->st_calculating = TRUE; Oct 12 13:34:18: | state: #1 requesting EVENT_v1_RETRANSMIT to be deleted Oct 12 13:34:18: | event_schedule called for 60 seconds Oct 12 13:34:18: | event_schedule_tv called for about 60 seconds and change Oct 12 13:34:18: | inserting event EVENT_CRYPTO_FAILED, timeout in 60.000000 seconds for #1 Oct 12 13:34:18: | complete v1 state transition with STF_SUSPEND Oct 12 13:34:18: | crypto helper 0 read fd: 12 Oct 12 13:34:18: | crypto helper 0 doing build KE and nonce; request ID 1 Oct 12 13:34:18: | NSS: Value of Prime: Oct 12 13:34:18: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 Oct 12 13:34:18: | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 Oct 12 13:34:18: | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd Oct 12 13:34:18: | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 Oct 12 13:34:18: | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 Oct 12 13:34:18: | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed Oct 12 13:34:18: | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 Oct 12 13:34:18: | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 Oct 12 13:34:18: | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f Oct 12 13:34:18: | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb Oct 12 13:34:18: | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 Oct 12 13:34:18: | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b Oct 12 13:34:18: | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f Oct 12 13:34:18: | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 Oct 12 13:34:18: | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 Oct 12 13:34:18: | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff Oct 12 13:34:18: | NSS: Value of base: 02 Oct 12 13:34:18: | NSS: generated dh priv and pub keys: 256 Oct 12 13:34:18: | NSS: Local DH secret (pointer): 0x7f5c10003280 Oct 12 13:34:18: | NSS: Public DH value sent(computed in NSS): Oct 12 13:34:18: | af 16 2e 45 66 1c 58 34 5b 5d f1 fa 1b 2b 04 3b Oct 12 13:34:18: | 17 3a c7 c1 be 3c e9 d6 15 cd 3e a9 a2 47 18 d1 Oct 12 13:34:18: | 8f 0f c4 99 f5 d9 0f a5 e4 b8 54 95 7e 87 f6 11 Oct 12 13:34:18: | d9 f1 9e e9 ec 76 46 9c b1 4f fc 42 5b 0d ee 38 Oct 12 13:34:18: | 13 f8 e2 a4 4b c5 49 ca 89 cd 8c 89 b5 92 8c 9f Oct 12 13:34:18: | a2 66 38 bf 2c 9d 5c 97 fc 35 77 62 f6 f0 a3 8d Oct 12 13:34:18: | 0d 2d 12 7d 50 bb 1d 27 5c 33 e1 2c 06 a8 ad d4 Oct 12 13:34:18: | d9 5c e9 09 72 44 87 76 c0 c3 30 23 b7 22 ba 71 Oct 12 13:34:18: | e0 a3 b3 79 0d 42 e0 f8 01 68 34 58 e2 a5 dc 03 Oct 12 13:34:18: | b4 d0 b0 6e 28 ab fc 5d 54 b6 33 bf df d8 63 10 Oct 12 13:34:18: | ca 85 3b 9e be c7 e4 d8 70 82 6b c7 a5 20 0f 8b Oct 12 13:34:18: | 17 3f 83 c9 bc 5b cc 0a a1 f6 cb 67 da 37 ea f3 Oct 12 13:34:18: | c3 46 29 8c 3f 92 92 13 f5 67 00 07 6e 27 cf 2e Oct 12 13:34:18: | ec f7 f3 5f cb f7 f6 e4 1d 11 4e 25 9c 75 fc 90 Oct 12 13:34:18: | ac 56 6b 96 36 31 19 bf 8e 3c eb ec 73 41 93 86 Oct 12 13:34:18: | 2d 62 c6 16 1a 29 95 ca ed dc 75 c7 a7 09 13 e1 Oct 12 13:34:18: | NSS: Local DH public value (pointer): 0x7f5c10002a70 Oct 12 13:34:18: | Generated nonce: 11 19 87 82 a8 55 11 ad 36 a3 32 fb 69 9a 63 5e Oct 12 13:34:18: | crypto helper 0 finished build KE and nonce; request ID 1 time elapsed 2025 usec Oct 12 13:34:18: | crypto helper 0 has finished work (pcw_work now 1) Oct 12 13:34:18: | crypto helper 0 replies to request ID 1 Oct 12 13:34:18: | calling continuation function 0x7f5c1b52d880 Oct 12 13:34:18: | main_inI2_outR2_continue for #1: calculated ke+nonce, sending R2 Oct 12 13:34:18: | processing connection "mytunnel" Oct 12 13:34:18: | #1 main_inI2_outR2_continue:1142 st->st_calculating = FALSE; Oct 12 13:34:18: | **emit ISAKMP Message: Oct 12 13:34:18: | initiator cookie: Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | responder cookie: Oct 12 13:34:18: | 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_KE (0x4) Oct 12 13:34:18: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 12 13:34:18: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 12 13:34:18: | flags: none (0x0) Oct 12 13:34:18: | message ID: 00 00 00 00 Oct 12 13:34:18: | saving DH priv (local secret) and pub key into state struct Oct 12 13:34:18: | ***emit ISAKMP Key Exchange Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONCE (0xa) Oct 12 13:34:18: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Oct 12 13:34:18: | keyex value af 16 2e 45 66 1c 58 34 5b 5d f1 fa 1b 2b 04 3b Oct 12 13:34:18: | keyex value 17 3a c7 c1 be 3c e9 d6 15 cd 3e a9 a2 47 18 d1 Oct 12 13:34:18: | keyex value 8f 0f c4 99 f5 d9 0f a5 e4 b8 54 95 7e 87 f6 11 Oct 12 13:34:18: | keyex value d9 f1 9e e9 ec 76 46 9c b1 4f fc 42 5b 0d ee 38 Oct 12 13:34:18: | keyex value 13 f8 e2 a4 4b c5 49 ca 89 cd 8c 89 b5 92 8c 9f Oct 12 13:34:18: | keyex value a2 66 38 bf 2c 9d 5c 97 fc 35 77 62 f6 f0 a3 8d Oct 12 13:34:18: | keyex value 0d 2d 12 7d 50 bb 1d 27 5c 33 e1 2c 06 a8 ad d4 Oct 12 13:34:18: | keyex value d9 5c e9 09 72 44 87 76 c0 c3 30 23 b7 22 ba 71 Oct 12 13:34:18: | keyex value e0 a3 b3 79 0d 42 e0 f8 01 68 34 58 e2 a5 dc 03 Oct 12 13:34:18: | keyex value b4 d0 b0 6e 28 ab fc 5d 54 b6 33 bf df d8 63 10 Oct 12 13:34:18: | keyex value ca 85 3b 9e be c7 e4 d8 70 82 6b c7 a5 20 0f 8b Oct 12 13:34:18: | keyex value 17 3f 83 c9 bc 5b cc 0a a1 f6 cb 67 da 37 ea f3 Oct 12 13:34:18: | keyex value c3 46 29 8c 3f 92 92 13 f5 67 00 07 6e 27 cf 2e Oct 12 13:34:18: | keyex value ec f7 f3 5f cb f7 f6 e4 1d 11 4e 25 9c 75 fc 90 Oct 12 13:34:18: | keyex value ac 56 6b 96 36 31 19 bf 8e 3c eb ec 73 41 93 86 Oct 12 13:34:18: | keyex value 2d 62 c6 16 1a 29 95 ca ed dc 75 c7 a7 09 13 e1 Oct 12 13:34:18: | emitting length of ISAKMP Key Exchange Payload: 260 Oct 12 13:34:18: | ***emit ISAKMP Nonce Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | emitting 16 raw bytes of Nr into ISAKMP Nonce Payload Oct 12 13:34:18: | Nr 11 19 87 82 a8 55 11 ad 36 a3 32 fb 69 9a 63 5e Oct 12 13:34:18: | emitting length of ISAKMP Nonce Payload: 20 Oct 12 13:34:18: | sending NAT-D payloads Oct 12 13:34:18: | natd_hash: hasher=0x7f5c1b7ee080(20) Oct 12 13:34:18: | natd_hash: icookie= 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | natd_hash: rcookie= 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | natd_hash: port=500 Oct 12 13:34:18: | natd_hash: hash= 58 9d cb 74 cf 54 5a 04 52 de 27 b6 ef 1c 95 65 Oct 12 13:34:18: | natd_hash: hash= b5 36 77 09 Oct 12 13:34:18: | ***emit ISAKMP NAT-D Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Oct 12 13:34:18: | emitting 20 raw bytes of NAT-D into ISAKMP NAT-D Payload Oct 12 13:34:18: | NAT-D 58 9d cb 74 cf 54 5a 04 52 de 27 b6 ef 1c 95 65 Oct 12 13:34:18: | NAT-D b5 36 77 09 Oct 12 13:34:18: | emitting length of ISAKMP NAT-D Payload: 24 Oct 12 13:34:18: | natd_hash: hasher=0x7f5c1b7ee080(20) Oct 12 13:34:18: | natd_hash: icookie= 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | natd_hash: rcookie= 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | natd_hash: port=500 Oct 12 13:34:18: | natd_hash: hash= 77 89 fc 0c ce 0d 31 de 73 c3 f2 3d db 2f ba ba Oct 12 13:34:18: | natd_hash: hash= e2 d2 f4 2a Oct 12 13:34:18: | ***emit ISAKMP NAT-D Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | emitting 20 raw bytes of NAT-D into ISAKMP NAT-D Payload Oct 12 13:34:18: | NAT-D 77 89 fc 0c ce 0d 31 de 73 c3 f2 3d db 2f ba ba Oct 12 13:34:18: | NAT-D e2 d2 f4 2a Oct 12 13:34:18: | emitting length of ISAKMP NAT-D Payload: 24 Oct 12 13:34:18: | no IKEv1 message padding required Oct 12 13:34:18: | emitting length of ISAKMP Message: 356 Oct 12 13:34:18: | main inI2_outR2: starting async DH calculation (group=14) Oct 12 13:34:18: | started looking for secret for 2001:470:dc8c:1000::28:70->2001:470:dc8c:1000::28:60 of kind PPK_PSK Oct 12 13:34:18: | actually looking for secret for 2001:470:dc8c:1000::28:70->2001:470:dc8c:1000::28:60 of kind PPK_PSK Oct 12 13:34:18: | line 1: key type PPK_PSK(2001:470:dc8c:1000::28:70) to type PPK_PSK Oct 12 13:34:18: | 1: compared key 2001:470:dc8c:1000::28:70 to 2001:470:dc8c:1000::28:70 / 2001:470:dc8c:1000::28:60 -> 8 Oct 12 13:34:18: | 2: compared key 2001:470:dc8c:1000::28:60 to 2001:470:dc8c:1000::28:70 / 2001:470:dc8c:1000::28:60 -> 12 Oct 12 13:34:18: | line 1: match=12 Oct 12 13:34:18: | best_match 0>12 best=0x7f5c1bd2a5c0 (line=1) Oct 12 13:34:18: | concluding with best_match=12 best=0x7f5c1bd2a5c0 (lineno=1) Oct 12 13:34:18: | parent1 type: 2 group: 14 len: 2776 Oct 12 13:34:18: | Copying DH pub key pointer to be sent to a thread helper Oct 12 13:34:18: | crypto helper 0: pcw_work: 0 Oct 12 13:34:18: | asking crypto helper 0 to do compute dh+iv (V1 Phase 1); request ID 2 (len=2776, pcw_work=0) Oct 12 13:34:18: | #1 send_crypto_helper_request:613 st->st_calculating = TRUE; Oct 12 13:34:18: | state: #1 requesting EVENT_CRYPTO_FAILED to be deleted Oct 12 13:34:18: | event_schedule called for 60 seconds Oct 12 13:34:18: | event_schedule_tv called for about 60 seconds and change Oct 12 13:34:18: | inserting event EVENT_CRYPTO_FAILED, timeout in 60.000000 seconds for #1 Oct 12 13:34:18: | started dh_secretiv, returned: stf=STF_SUSPEND Oct 12 13:34:18: | #1 main_inI2_outR2_tail:1381 st->st_calculating = FALSE; Oct 12 13:34:18: | complete v1 state transition with STF_OK Oct 12 13:34:18: "mytunnel" #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 Oct 12 13:34:18: | parent state #1: STATE_MAIN_R1(open-ike) > STATE_MAIN_R2(open-ike) Oct 12 13:34:18: | ignore states: 0 Oct 12 13:34:18: | half-open-ike states: 0 Oct 12 13:34:18: | open-ike states: 1 Oct 12 13:34:18: | established-anonymous-ike states: 0 Oct 12 13:34:18: | established-authenticated-ike states: 0 Oct 12 13:34:18: | anonymous-ipsec states: 0 Oct 12 13:34:18: | authenticated-ipsec states: 0 Oct 12 13:34:18: | informational states: 0 Oct 12 13:34:18: | unknown states: 0 Oct 12 13:34:18: | category states: 1 count states: 1 Oct 12 13:34:18: | state: #1 requesting EVENT_CRYPTO_FAILED to be deleted Oct 12 13:34:18: | sending reply packet to 2001:470:dc8c:1000::28:60:500 (from port 500) Oct 12 13:34:18: | sending 356 bytes for STATE_MAIN_R1 through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #1) Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | 04 10 02 00 00 00 00 00 00 00 01 64 0a 00 01 04 Oct 12 13:34:18: | af 16 2e 45 66 1c 58 34 5b 5d f1 fa 1b 2b 04 3b Oct 12 13:34:18: | 17 3a c7 c1 be 3c e9 d6 15 cd 3e a9 a2 47 18 d1 Oct 12 13:34:18: | 8f 0f c4 99 f5 d9 0f a5 e4 b8 54 95 7e 87 f6 11 Oct 12 13:34:18: | d9 f1 9e e9 ec 76 46 9c b1 4f fc 42 5b 0d ee 38 Oct 12 13:34:18: | 13 f8 e2 a4 4b c5 49 ca 89 cd 8c 89 b5 92 8c 9f Oct 12 13:34:18: | a2 66 38 bf 2c 9d 5c 97 fc 35 77 62 f6 f0 a3 8d Oct 12 13:34:18: | 0d 2d 12 7d 50 bb 1d 27 5c 33 e1 2c 06 a8 ad d4 Oct 12 13:34:18: | d9 5c e9 09 72 44 87 76 c0 c3 30 23 b7 22 ba 71 Oct 12 13:34:18: | e0 a3 b3 79 0d 42 e0 f8 01 68 34 58 e2 a5 dc 03 Oct 12 13:34:18: | b4 d0 b0 6e 28 ab fc 5d 54 b6 33 bf df d8 63 10 Oct 12 13:34:18: | ca 85 3b 9e be c7 e4 d8 70 82 6b c7 a5 20 0f 8b Oct 12 13:34:18: | 17 3f 83 c9 bc 5b cc 0a a1 f6 cb 67 da 37 ea f3 Oct 12 13:34:18: | c3 46 29 8c 3f 92 92 13 f5 67 00 07 6e 27 cf 2e Oct 12 13:34:18: | ec f7 f3 5f cb f7 f6 e4 1d 11 4e 25 9c 75 fc 90 Oct 12 13:34:18: | ac 56 6b 96 36 31 19 bf 8e 3c eb ec 73 41 93 86 Oct 12 13:34:18: | 2d 62 c6 16 1a 29 95 ca ed dc 75 c7 a7 09 13 e1 Oct 12 13:34:18: | 14 00 00 14 11 19 87 82 a8 55 11 ad 36 a3 32 fb Oct 12 13:34:18: | 69 9a 63 5e 14 00 00 18 58 9d cb 74 cf 54 5a 04 Oct 12 13:34:18: | 52 de 27 b6 ef 1c 95 65 b5 36 77 09 00 00 00 18 Oct 12 13:34:18: | 77 89 fc 0c ce 0d 31 de 73 c3 f2 3d db 2f ba ba Oct 12 13:34:18: | e2 d2 f4 2a Oct 12 13:34:18: | event_schedule_ms called for about 500 ms Oct 12 13:34:18: | event_schedule_tv called for about 0 seconds and change Oct 12 13:34:18: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500000 seconds for #1 Oct 12 13:34:18: "mytunnel" #1: STATE_MAIN_R2: sent MR2, expecting MI3 Oct 12 13:34:18: | modecfg pull: noquirk policy:push not-client Oct 12 13:34:18: | phase 1 is done, looking for phase 2 to unpend Oct 12 13:34:18: | crypto helper 0 read fd: 12 Oct 12 13:34:18: | crypto helper 0 doing compute dh+iv (V1 Phase 1); request ID 2 Oct 12 13:34:18: | peer's g: 87 c1 ce 29 10 67 b4 ba 58 3c 04 cc e4 01 7d db Oct 12 13:34:18: | peer's g: 2a 3e e2 eb 5d 12 6c da 7a 45 ca 38 f2 02 23 d8 Oct 12 13:34:18: | peer's g: f8 54 9c b8 e2 1e 9b 86 e6 60 47 f7 9e ff 20 ed Oct 12 13:34:18: | peer's g: 54 d8 22 25 55 a4 1e 6c 3f 2a 7a 97 16 7c 43 df Oct 12 13:34:18: | peer's g: f0 18 59 7e a0 d8 ba a3 9b c0 e4 88 a9 dd 40 2f Oct 12 13:34:18: | peer's g: fb 6d 77 2f 62 c5 0f 89 4f 48 ba 52 c5 20 08 eb Oct 12 13:34:18: | peer's g: 15 02 f6 78 32 21 44 79 2a 6e 61 b5 c8 44 f7 79 Oct 12 13:34:18: | peer's g: 4e be 95 27 94 f2 af 65 c2 aa a7 49 49 b2 f6 69 Oct 12 13:34:18: | peer's g: 14 10 c4 ad 2f d3 c0 37 12 56 c0 24 20 5b e6 2c Oct 12 13:34:18: | peer's g: af 73 54 9e b3 71 b5 8b cb 5c 63 87 9f 68 5f 1d Oct 12 13:34:18: | peer's g: 95 04 7f d9 5c b5 86 4e ab fc 7e ea 29 2f 01 40 Oct 12 13:34:18: | peer's g: d1 8f ed e4 6e fa 6d bb c2 cd 5c 3d f3 ca ad 81 Oct 12 13:34:18: | peer's g: 04 98 8d 7d 0b a2 9a 88 b0 c4 76 19 43 d5 f8 4d Oct 12 13:34:18: | peer's g: 51 81 ba 72 e8 29 5f a0 a5 e2 74 ae dd a3 ad 41 Oct 12 13:34:18: | peer's g: 0f 10 23 48 ae 80 d7 87 3f 76 ac 74 64 b6 ad b8 Oct 12 13:34:18: | peer's g: 26 9e 03 b4 8b 3c a4 fe b2 96 88 3b 02 9f 7b 9b Oct 12 13:34:18: | Started DH shared-secret computation in NSS: Oct 12 13:34:18: | SKEYID psk prf: init 0x7f5c10000d40 Oct 12 13:34:18: | SKEYID psk prf: init chunk psk 0x7f5c15a05730 (length 64) Oct 12 13:34:18: | symkey_from_bytes merge symkey(0x7f5c1bd24450) bytes(0x7f5c15a05730/64) - derive(CONCATENATE_DATA_AND_BASE) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:34:18: | symkey: key(0x7f5c1bd24450) length(256) type/mechanism(CONCATENATE_DATA_AND_BASE 0x00000363) Oct 12 13:34:18: | bytes: 71 47 57 57 4c 75 43 44 66 4f 5a 77 5a 36 71 6b Oct 12 13:34:18: | bytes: 75 34 5a 71 69 37 79 71 53 62 36 32 50 42 47 72 Oct 12 13:34:18: | bytes: 61 56 2f 34 6f 46 75 36 6f 76 53 69 4d 4a 7a 69 Oct 12 13:34:18: | bytes: 2f 50 62 70 4b 6e 65 70 54 34 6f 32 6f 6c 79 4f Oct 12 13:34:18: | symkey_from_bytes key(0x7f5c1bd25cd0) length(320) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:34:18: | key: symkey from symkey(0x7f5c1bd25cd0) - next-byte(0) key-size(64) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(320) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:34:18: | key: key(0x7f5c10007210) length(64) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:34:18: | symkey_from_bytes: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | SKEYID psk prf: update Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10007210) bytes(0x7f5c15a05580/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10007210) length(64) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c1bd25cd0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | SKEYID psk prf: update chunk Ni 0x7f5c15a05770 (length 16) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd25cd0) bytes(0x7f5c15a05770/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | bytes: ea cd 80 8d 0e 37 3f 3d 2c 7e a8 97 c9 b4 c8 85 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(80) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | SKEYID psk prf: update chunk Nr 0x7f5c15a05780 (length 16) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10006f70) bytes(0x7f5c15a05780/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(80) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 11 19 87 82 a8 55 11 ad 36 a3 32 fb 69 9a 63 5e Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd25cd0) length(96) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10006f70 Oct 12 13:34:18: | SKEYID psk prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c1bd25cd0) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(96) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c10006f70) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10007210) bytes(0x7f5c15a055b0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10007210) length(64) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c1bd25cd0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c1bd25cd0) symkey(2: 0x7f5c10006f70) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c1bd25cd0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c10006f70) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c1000a220) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf key: free key 0x7f5c10007210 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c1000a220) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000a220) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash key(0x7f5c10007210) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf outer: free key 0x7f5c1000a220 Oct 12 13:34:18: | prf final result key(0x7f5c10007210) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | SKEYID_d prf: init 0x7f5c10000d40 Oct 12 13:34:18: | SKEYID_d prf: init symkey SKEYID 0x7f5c10007210 (length 20) Oct 12 13:34:18: | SKEYID_d prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10007210) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10007210) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000a220) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1000a220) bytes(0x7f5c15a05580/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1000a220) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | SKEYID_d prf: update symkey g^xy 0x7f5c1bd24450 (length 256) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c1bd24450) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1bd24450) length(256) type/mechanism(CONCATENATE_DATA_AND_BASE 0x00000363) Oct 12 13:34:18: | concat: key(0x7f5c1bd25cd0) length(320) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | SKEYID_d prf: update chunk CKI_i 0x7f5c15a05990 (length 8) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd25cd0) bytes(0x7f5c15a05990/8) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(320) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(328) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | SKEYID_d prf: update chunk CKI_r 0x7f5c15a05998 (length 8) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10006f70) bytes(0x7f5c15a05998/8) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(328) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd25cd0) length(336) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10006f70 Oct 12 13:34:18: | SKEYID_d prf: update byte 0 Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd25cd0) bytes(0x7f5c15a0561c/1) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(336) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(337) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | SKEYID_d prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c10006f70) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(337) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c1bd25cd0) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c10006f70 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1000a220) bytes(0x7f5c15a055b0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1000a220) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c1bd25cd0) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1bd25cd0) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c1000b990) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | prf key: free key 0x7f5c1000a220 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c1000b990) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000b990) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash key(0x7f5c1000a220) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf outer: free key 0x7f5c1000b990 Oct 12 13:34:18: | prf final result key(0x7f5c1000a220) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | SKEYID_a prf: init 0x7f5c10000d40 Oct 12 13:34:18: | SKEYID_a prf: init symkey SKEYID 0x7f5c10007210 (length 20) Oct 12 13:34:18: | SKEYID_a prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10007210) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10007210) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000b990) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1000b990) bytes(0x7f5c15a05580/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1000b990) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c1bd25cd0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | SKEYID_a prf: update symkey SKEYID_d 0x7f5c1000a220 (length 20) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c1bd25cd0) symkey(2: 0x7f5c1000a220) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c1bd25cd0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1000a220) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10006f70) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | SKEYID_a prf: update symkey g^xy 0x7f5c1bd24450 (length 256) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c1bd24450) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | symkey 2: key(0x7f5c1bd24450) length(256) type/mechanism(CONCATENATE_DATA_AND_BASE 0x00000363) Oct 12 13:34:18: | concat: key(0x7f5c1bd25cd0) length(340) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | SKEYID_a prf: update chunk CKI_i 0x7f5c15a05990 (length 8) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd25cd0) bytes(0x7f5c15a05990/8) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(340) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(348) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | SKEYID_a prf: update chunk CKI_r 0x7f5c15a05998 (length 8) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10006f70) bytes(0x7f5c15a05998/8) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(348) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd25cd0) length(356) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10006f70 Oct 12 13:34:18: | SKEYID_a prf: update byte 1 Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd25cd0) bytes(0x7f5c15a0561c/1) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(356) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 01 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(357) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | SKEYID_a prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c10006f70) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(357) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c1bd25cd0) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c10006f70 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1000b990) bytes(0x7f5c15a055b0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1000b990) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c1bd25cd0) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1bd25cd0) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c1000d210) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | prf key: free key 0x7f5c1000b990 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c1000d210) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000d210) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash key(0x7f5c1000b990) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf outer: free key 0x7f5c1000d210 Oct 12 13:34:18: | prf final result key(0x7f5c1000b990) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | SKEYID_e prf: init 0x7f5c10000d40 Oct 12 13:34:18: | SKEYID_e prf: init symkey SKEYID 0x7f5c10007210 (length 20) Oct 12 13:34:18: | SKEYID_e prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10007210) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10007210) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000d210) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1000d210) bytes(0x7f5c15a05580/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1000d210) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c1bd25cd0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | SKEYID_e prf: update symkey SKEYID_a 0x7f5c1000b990 (length 20) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c1bd25cd0) symkey(2: 0x7f5c1000b990) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c1bd25cd0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1000b990) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10006f70) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | SKEYID_e prf: update symkey g^xy 0x7f5c1bd24450 (length 256) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c1bd24450) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | symkey 2: key(0x7f5c1bd24450) length(256) type/mechanism(CONCATENATE_DATA_AND_BASE 0x00000363) Oct 12 13:34:18: | concat: key(0x7f5c1bd25cd0) length(340) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | SKEYID_e prf: update chunk CKI_i 0x7f5c15a05990 (length 8) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd25cd0) bytes(0x7f5c15a05990/8) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(340) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(348) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | SKEYID_e prf: update chunk CKI_r 0x7f5c15a05998 (length 8) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10006f70) bytes(0x7f5c15a05998/8) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(348) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd25cd0) length(356) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10006f70 Oct 12 13:34:18: | SKEYID_e prf: update byte 2 Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd25cd0) bytes(0x7f5c15a0561c/1) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(356) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 02 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(357) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | SKEYID_e prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c10006f70) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(357) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c1bd25cd0) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c10006f70 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1000d210) bytes(0x7f5c15a055b0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1000d210) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c1bd25cd0) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1bd25cd0) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c1000ea90) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | prf key: free key 0x7f5c1000d210 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c1000ea90) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash key(0x7f5c1000d210) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf outer: free key 0x7f5c1000ea90 Oct 12 13:34:18: | prf final result key(0x7f5c1000d210) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | appendix_b prf: init 0x7f5c10000d40 Oct 12 13:34:18: | appendix_b prf: init symkey SKEYID_e 0x7f5c1000d210 (length 20) Oct 12 13:34:18: | appendix_b prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000d210) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000d210) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1000ea90) bytes(0x7f5c15a055d0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c1bd25cd0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | appendix_b prf: update byte 0 Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd25cd0) bytes(0x7f5c15a0566c/1) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | bytes: 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(65) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | appendix_b prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c10006f70) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(65) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c1bd25cd0) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c10006f70 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1000ea90) bytes(0x7f5c15a055b0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c1bd25cd0) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1bd25cd0) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10010470) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | prf key: free key 0x7f5c1000ea90 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c10010470) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf outer: free key 0x7f5c10010470 Oct 12 13:34:18: | prf final result key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | key: symkey from symkey(0x7f5c1000ea90) - next-byte(0) key-size(20) flags(0x0) derive(EXTRACT_KEY_FROM_KEY) target(EXTRACT_KEY_FROM_KEY) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | key: key(0x7f5c10010470) length(20) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:34:18: | SKEYID_e prf: init 0x7f5c10000d40 Oct 12 13:34:18: | SKEYID_e prf: init symkey SKEYID_e 0x7f5c1000d210 (length 20) Oct 12 13:34:18: | SKEYID_e prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000d210) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000d210) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd25cd0) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1bd25cd0) bytes(0x7f5c15a055d0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | SKEYID_e prf: update symkey old_k 0x7f5c10010470 (length 20) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c10010470) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c10010470) length(20) type/mechanism(EXTRACT_KEY_FROM_KEY 0x00000365) Oct 12 13:34:18: | concat: key(0x7f5c10011d00) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | SKEYID_e prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c10011d00) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10011d00) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c10006f70) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c10011d00 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1bd25cd0) bytes(0x7f5c15a055b0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1bd25cd0) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10011d00) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10011d00) symkey(2: 0x7f5c10006f70) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10011d00) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c10006f70) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10013530) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10011d00 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf key: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c10013530) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10013530) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash key(0x7f5c1bd25cd0) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf outer: free key 0x7f5c10013530 Oct 12 13:34:18: | prf final result key(0x7f5c1bd25cd0) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c1000ea90) symkey(2: 0x7f5c1bd25cd0) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | symkey 2: key(0x7f5c1bd25cd0) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10013530) length(40) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c1000ea90 Oct 12 13:34:18: | old_k#N: free key 0x7f5c10010470 Oct 12 13:34:18: | old_k#final: free key 0x7f5c1bd25cd0 Oct 12 13:34:18: | crypt key: symkey from symkey(0x7f5c10013530) - next-byte(0) key-size(32) flags(0x300) derive(EXTRACT_KEY_FROM_KEY) target(AES_CBC) Oct 12 13:34:18: | symkey: key(0x7f5c10013530) length(40) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | crypt key: key(0x7f5c1bd25cd0) length(32) type/mechanism(AES_CBC 0x00001082) Oct 12 13:34:18: | keymat: free key 0x7f5c10013530 Oct 12 13:34:18: | NSS: pointers skeyid_d 0x7f5c1000a220, skeyid_a 0x7f5c1000b990, skeyid_e 0x7f5c1000d210, enc_key 0x7f5c1bd25cd0 Oct 12 13:34:18: | DH_i: 87 c1 ce 29 10 67 b4 ba 58 3c 04 cc e4 01 7d db Oct 12 13:34:18: | DH_i: 2a 3e e2 eb 5d 12 6c da 7a 45 ca 38 f2 02 23 d8 Oct 12 13:34:18: | DH_i: f8 54 9c b8 e2 1e 9b 86 e6 60 47 f7 9e ff 20 ed Oct 12 13:34:18: | DH_i: 54 d8 22 25 55 a4 1e 6c 3f 2a 7a 97 16 7c 43 df Oct 12 13:34:18: | DH_i: f0 18 59 7e a0 d8 ba a3 9b c0 e4 88 a9 dd 40 2f Oct 12 13:34:18: | DH_i: fb 6d 77 2f 62 c5 0f 89 4f 48 ba 52 c5 20 08 eb Oct 12 13:34:18: | DH_i: 15 02 f6 78 32 21 44 79 2a 6e 61 b5 c8 44 f7 79 Oct 12 13:34:18: | DH_i: 4e be 95 27 94 f2 af 65 c2 aa a7 49 49 b2 f6 69 Oct 12 13:34:18: | DH_i: 14 10 c4 ad 2f d3 c0 37 12 56 c0 24 20 5b e6 2c Oct 12 13:34:18: | DH_i: af 73 54 9e b3 71 b5 8b cb 5c 63 87 9f 68 5f 1d Oct 12 13:34:18: | DH_i: 95 04 7f d9 5c b5 86 4e ab fc 7e ea 29 2f 01 40 Oct 12 13:34:18: | DH_i: d1 8f ed e4 6e fa 6d bb c2 cd 5c 3d f3 ca ad 81 Oct 12 13:34:18: | DH_i: 04 98 8d 7d 0b a2 9a 88 b0 c4 76 19 43 d5 f8 4d Oct 12 13:34:18: | DH_i: 51 81 ba 72 e8 29 5f a0 a5 e2 74 ae dd a3 ad 41 Oct 12 13:34:18: | DH_i: 0f 10 23 48 ae 80 d7 87 3f 76 ac 74 64 b6 ad b8 Oct 12 13:34:18: | DH_i: 26 9e 03 b4 8b 3c a4 fe b2 96 88 3b 02 9f 7b 9b Oct 12 13:34:18: | DH_r: af 16 2e 45 66 1c 58 34 5b 5d f1 fa 1b 2b 04 3b Oct 12 13:34:18: | DH_r: 17 3a c7 c1 be 3c e9 d6 15 cd 3e a9 a2 47 18 d1 Oct 12 13:34:18: | DH_r: 8f 0f c4 99 f5 d9 0f a5 e4 b8 54 95 7e 87 f6 11 Oct 12 13:34:18: | DH_r: d9 f1 9e e9 ec 76 46 9c b1 4f fc 42 5b 0d ee 38 Oct 12 13:34:18: | DH_r: 13 f8 e2 a4 4b c5 49 ca 89 cd 8c 89 b5 92 8c 9f Oct 12 13:34:18: | DH_r: a2 66 38 bf 2c 9d 5c 97 fc 35 77 62 f6 f0 a3 8d Oct 12 13:34:18: | DH_r: 0d 2d 12 7d 50 bb 1d 27 5c 33 e1 2c 06 a8 ad d4 Oct 12 13:34:18: | DH_r: d9 5c e9 09 72 44 87 76 c0 c3 30 23 b7 22 ba 71 Oct 12 13:34:18: | DH_r: e0 a3 b3 79 0d 42 e0 f8 01 68 34 58 e2 a5 dc 03 Oct 12 13:34:18: | DH_r: b4 d0 b0 6e 28 ab fc 5d 54 b6 33 bf df d8 63 10 Oct 12 13:34:18: | DH_r: ca 85 3b 9e be c7 e4 d8 70 82 6b c7 a5 20 0f 8b Oct 12 13:34:18: | DH_r: 17 3f 83 c9 bc 5b cc 0a a1 f6 cb 67 da 37 ea f3 Oct 12 13:34:18: | DH_r: c3 46 29 8c 3f 92 92 13 f5 67 00 07 6e 27 cf 2e Oct 12 13:34:18: | DH_r: ec f7 f3 5f cb f7 f6 e4 1d 11 4e 25 9c 75 fc 90 Oct 12 13:34:18: | DH_r: ac 56 6b 96 36 31 19 bf 8e 3c eb ec 73 41 93 86 Oct 12 13:34:18: | DH_r: 2d 62 c6 16 1a 29 95 ca ed dc 75 c7 a7 09 13 e1 Oct 12 13:34:18: | end of IV generation Oct 12 13:34:18: | crypto helper 0 finished compute dh+iv (V1 Phase 1); request ID 2 time elapsed 5809 usec Oct 12 13:34:18: | crypto helper 0 has finished work (pcw_work now 1) Oct 12 13:34:18: | crypto helper 0 replies to request ID 2 Oct 12 13:34:18: | calling continuation function 0x7f5c1b52aff0 Oct 12 13:34:18: | main_inI2_outR2_calcdone for #1: calculate DH finished Oct 12 13:34:18: | processing connection "mytunnel" Oct 12 13:34:18: | *received 76 bytes from 2001:470:dc8c:1000::28:60:500 on eth0 (port=500) Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | 05 10 02 01 00 00 00 00 00 00 00 4c 26 99 ea 8d Oct 12 13:34:18: | 35 60 24 ee a2 40 35 9e f4 01 42 8c 5b a8 96 dd Oct 12 13:34:18: | f2 5e b5 4c d9 8d 3c 3c 96 fb a5 2c de fb 63 35 Oct 12 13:34:18: | ca 83 43 a3 19 6c 74 bd 79 7d 14 d7 Oct 12 13:34:18: | **parse ISAKMP Message: Oct 12 13:34:18: | initiator cookie: Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | responder cookie: Oct 12 13:34:18: | 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_ID (0x5) Oct 12 13:34:18: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 12 13:34:18: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 12 13:34:18: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Oct 12 13:34:18: | message ID: 00 00 00 00 Oct 12 13:34:18: | length: 76 (0x4c) Oct 12 13:34:18: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 12 13:34:18: | finding hash chain in state hash table Oct 12 13:34:18: | ICOOKIE: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | RCOOKIE: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | found hash chain 7 Oct 12 13:34:18: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000 Oct 12 13:34:18: | v1 state object #1 found, in STATE_MAIN_R2 Oct 12 13:34:18: | processing connection "mytunnel" Oct 12 13:34:18: | #1 state_busy:2221 st != NULL && st->st_calculating == FALSE; Oct 12 13:34:18: | received encrypted packet from 2001:470:dc8c:1000::28:60:500 Oct 12 13:34:18: | decrypting 48 bytes using algorithm OAKLEY_AES_CBC Oct 12 13:34:18: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:34:18: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:34:18: | decrypted: Oct 12 13:34:18: | 08 00 00 18 05 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:34:18: | 00 00 00 00 00 28 00 60 00 00 00 18 55 73 05 bf Oct 12 13:34:18: | 44 07 cd ad c7 cc 4b 0c bb f5 66 34 cf df 24 bd Oct 12 13:34:18: | next IV: de fb 63 35 ca 83 43 a3 19 6c 74 bd 79 7d 14 d7 Oct 12 13:34:18: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x120opt: 0x2080 Oct 12 13:34:18: | ***parse ISAKMP Identification Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_HASH (0x8) Oct 12 13:34:18: | length: 24 (0x18) Oct 12 13:34:18: | ID type: ID_IPV6_ADDR (0x5) Oct 12 13:34:18: | DOI specific A: 0 (0x0) Oct 12 13:34:18: | DOI specific B: 0 (0x0) Oct 12 13:34:18: | obj: 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 60 Oct 12 13:34:18: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100opt: 0x2080 Oct 12 13:34:18: | ***parse ISAKMP Hash Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | length: 24 (0x18) Oct 12 13:34:18: "mytunnel" #1: Main mode peer ID is ID_IPV6_ADDR: '2001:470:dc8c:1000::28:60' Oct 12 13:34:18: | refine_host_connection: starting with mytunnel Oct 12 13:34:18: | match_id a=2001:470:dc8c:1000::28:60 Oct 12 13:34:18: | b=2001:470:dc8c:1000::28:60 Oct 12 13:34:18: | results matched Oct 12 13:34:18: | trusted_ca_nss called with a=(empty) b=(empty) Oct 12 13:34:18: | refine_host_connection: checking mytunnel against mytunnel, best=(none) with match=1(id=1/ca=1/reqca=1) Oct 12 13:34:18: | refine_host_connection: checked mytunnel against mytunnel, now for see if best Oct 12 13:34:18: | started looking for secret for 2001:470:dc8c:1000::28:70->2001:470:dc8c:1000::28:60 of kind PPK_PSK Oct 12 13:34:18: | actually looking for secret for 2001:470:dc8c:1000::28:70->2001:470:dc8c:1000::28:60 of kind PPK_PSK Oct 12 13:34:18: | line 1: key type PPK_PSK(2001:470:dc8c:1000::28:70) to type PPK_PSK Oct 12 13:34:18: | 1: compared key 2001:470:dc8c:1000::28:70 to 2001:470:dc8c:1000::28:70 / 2001:470:dc8c:1000::28:60 -> 8 Oct 12 13:34:18: | 2: compared key 2001:470:dc8c:1000::28:60 to 2001:470:dc8c:1000::28:70 / 2001:470:dc8c:1000::28:60 -> 12 Oct 12 13:34:18: | line 1: match=12 Oct 12 13:34:18: | best_match 0>12 best=0x7f5c1bd2a5c0 (line=1) Oct 12 13:34:18: | concluding with best_match=12 best=0x7f5c1bd2a5c0 (lineno=1) Oct 12 13:34:18: | offered CA: '%none' Oct 12 13:34:18: | hmac prf: init 0x7f5c1bd2a7f0 Oct 12 13:34:18: | hmac prf: init symkey symkey 0x7f5c10007210 (length 20) Oct 12 13:34:18: | hmac prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10007210) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10007210) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10013530) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10013530) bytes(0x7ffdf83725e0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10013530) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10010470) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2be30 (length 256) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10010470) bytes(0x7f5c1bd2be30/256) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | bytes: 87 c1 ce 29 10 67 b4 ba 58 3c 04 cc e4 01 7d db Oct 12 13:34:18: | bytes: 2a 3e e2 eb 5d 12 6c da 7a 45 ca 38 f2 02 23 d8 Oct 12 13:34:18: | bytes: f8 54 9c b8 e2 1e 9b 86 e6 60 47 f7 9e ff 20 ed Oct 12 13:34:18: | bytes: 54 d8 22 25 55 a4 1e 6c 3f 2a 7a 97 16 7c 43 df Oct 12 13:34:18: | bytes: f0 18 59 7e a0 d8 ba a3 9b c0 e4 88 a9 dd 40 2f Oct 12 13:34:18: | bytes: fb 6d 77 2f 62 c5 0f 89 4f 48 ba 52 c5 20 08 eb Oct 12 13:34:18: | bytes: 15 02 f6 78 32 21 44 79 2a 6e 61 b5 c8 44 f7 79 Oct 12 13:34:18: | bytes: 4e be 95 27 94 f2 af 65 c2 aa a7 49 49 b2 f6 69 Oct 12 13:34:18: | bytes: 14 10 c4 ad 2f d3 c0 37 12 56 c0 24 20 5b e6 2c Oct 12 13:34:18: | bytes: af 73 54 9e b3 71 b5 8b cb 5c 63 87 9f 68 5f 1d Oct 12 13:34:18: | bytes: 95 04 7f d9 5c b5 86 4e ab fc 7e ea 29 2f 01 40 Oct 12 13:34:18: | bytes: d1 8f ed e4 6e fa 6d bb c2 cd 5c 3d f3 ca ad 81 Oct 12 13:34:18: | bytes: 04 98 8d 7d 0b a2 9a 88 b0 c4 76 19 43 d5 f8 4d Oct 12 13:34:18: | bytes: 51 81 ba 72 e8 29 5f a0 a5 e2 74 ae dd a3 ad 41 Oct 12 13:34:18: | bytes: 0f 10 23 48 ae 80 d7 87 3f 76 ac 74 64 b6 ad b8 Oct 12 13:34:18: | bytes: 26 9e 03 b4 8b 3c a4 fe b2 96 88 3b 02 9f 7b 9b Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(320) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10010470 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2ce90 (length 256) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1bd2ce90/256) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(320) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: af 16 2e 45 66 1c 58 34 5b 5d f1 fa 1b 2b 04 3b Oct 12 13:34:18: | bytes: 17 3a c7 c1 be 3c e9 d6 15 cd 3e a9 a2 47 18 d1 Oct 12 13:34:18: | bytes: 8f 0f c4 99 f5 d9 0f a5 e4 b8 54 95 7e 87 f6 11 Oct 12 13:34:18: | bytes: d9 f1 9e e9 ec 76 46 9c b1 4f fc 42 5b 0d ee 38 Oct 12 13:34:18: | bytes: 13 f8 e2 a4 4b c5 49 ca 89 cd 8c 89 b5 92 8c 9f Oct 12 13:34:18: | bytes: a2 66 38 bf 2c 9d 5c 97 fc 35 77 62 f6 f0 a3 8d Oct 12 13:34:18: | bytes: 0d 2d 12 7d 50 bb 1d 27 5c 33 e1 2c 06 a8 ad d4 Oct 12 13:34:18: | bytes: d9 5c e9 09 72 44 87 76 c0 c3 30 23 b7 22 ba 71 Oct 12 13:34:18: | bytes: e0 a3 b3 79 0d 42 e0 f8 01 68 34 58 e2 a5 dc 03 Oct 12 13:34:18: | bytes: b4 d0 b0 6e 28 ab fc 5d 54 b6 33 bf df d8 63 10 Oct 12 13:34:18: | bytes: ca 85 3b 9e be c7 e4 d8 70 82 6b c7 a5 20 0f 8b Oct 12 13:34:18: | bytes: 17 3f 83 c9 bc 5b cc 0a a1 f6 cb 67 da 37 ea f3 Oct 12 13:34:18: | bytes: c3 46 29 8c 3f 92 92 13 f5 67 00 07 6e 27 cf 2e Oct 12 13:34:18: | bytes: ec f7 f3 5f cb f7 f6 e4 1d 11 4e 25 9c 75 fc 90 Oct 12 13:34:18: | bytes: ac 56 6b 96 36 31 19 bf 8e 3c eb ec 73 41 93 86 Oct 12 13:34:18: | bytes: 2d 62 c6 16 1a 29 95 ca ed dc 75 c7 a7 09 13 e1 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10010470) length(576) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2c458 (length 8) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10010470) bytes(0x7f5c1bd2c458/8) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(576) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(584) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10010470 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2c480 (length 8) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1bd2c480/8) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(584) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10010470) length(592) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hashing 640 bytes of SA Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2c7b4 (length 640) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10010470) bytes(0x7f5c1bd2c7b4/640) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(592) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Oct 12 13:34:18: | bytes: 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 07 80 02 00 02 80 03 00 01 80 04 00 0e Oct 12 13:34:18: | bytes: 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Oct 12 13:34:18: | bytes: 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 01 Oct 12 13:34:18: | bytes: 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Oct 12 13:34:18: | bytes: 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 01 Oct 12 13:34:18: | bytes: 80 03 00 01 80 04 00 0e 80 0e 01 00 03 00 00 24 Oct 12 13:34:18: | bytes: 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Oct 12 13:34:18: | bytes: 80 02 00 01 80 03 00 01 80 04 00 0e 80 0e 00 80 Oct 12 13:34:18: | bytes: 03 00 00 20 04 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 0e Oct 12 13:34:18: | bytes: 03 00 00 20 05 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 0e Oct 12 13:34:18: | bytes: 03 00 00 24 06 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 07 80 02 00 02 80 03 00 01 80 04 00 05 Oct 12 13:34:18: | bytes: 80 0e 01 00 03 00 00 24 07 01 00 00 80 0b 00 01 Oct 12 13:34:18: | bytes: 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 01 Oct 12 13:34:18: | bytes: 80 04 00 05 80 0e 00 80 03 00 00 24 08 01 00 00 Oct 12 13:34:18: | bytes: 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 01 Oct 12 13:34:18: | bytes: 80 03 00 01 80 04 00 05 80 0e 01 00 03 00 00 24 Oct 12 13:34:18: | bytes: 09 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Oct 12 13:34:18: | bytes: 80 02 00 01 80 03 00 01 80 04 00 05 80 0e 00 80 Oct 12 13:34:18: | bytes: 03 00 00 20 0a 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 05 Oct 12 13:34:18: | bytes: 03 00 00 20 0b 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 05 Oct 12 13:34:18: | bytes: 03 00 00 24 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 07 80 02 00 02 80 03 00 01 80 04 00 02 Oct 12 13:34:18: | bytes: 80 0e 01 00 03 00 00 24 0d 01 00 00 80 0b 00 01 Oct 12 13:34:18: | bytes: 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 01 Oct 12 13:34:18: | bytes: 80 04 00 02 80 0e 00 80 03 00 00 24 0e 01 00 00 Oct 12 13:34:18: | bytes: 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 01 Oct 12 13:34:18: | bytes: 80 03 00 01 80 04 00 02 80 0e 01 00 03 00 00 24 Oct 12 13:34:18: | bytes: 0f 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Oct 12 13:34:18: | bytes: 80 02 00 01 80 03 00 01 80 04 00 02 80 0e 00 80 Oct 12 13:34:18: | bytes: 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 02 Oct 12 13:34:18: | bytes: 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 02 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(1232) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10010470 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2bfa0 (length 20) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1bd2bfa0/20) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(1232) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 05 00 00 00 20 01 04 70 dc 8c 10 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 28 00 60 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10010470) length(1252) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hmac prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c10010470) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(1252) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c10010470 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10013530) bytes(0x7ffdf83725c0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10013530) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10010470) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10010470) symkey(2: 0x7f5c1000ea90) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10010470) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10006f70) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10010470 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c1000ea90 Oct 12 13:34:18: | prf key: free key 0x7f5c10013530 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c10006f70) to bytes Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash 55 73 05 bf 44 07 cd ad c7 cc 4b 0c bb f5 66 34 Oct 12 13:34:18: | prf outer hash cf df 24 bd Oct 12 13:34:18: | prf outer: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf final bytes 55 73 05 bf 44 07 cd ad c7 cc 4b 0c bb f5 66 34 Oct 12 13:34:18: | prf final bytes cf df 24 bd Oct 12 13:34:18: | authentication succeeded Oct 12 13:34:18: | thinking about whether to send my certificate: Oct 12 13:34:18: | I have RSA key: OAKLEY_PRESHARED_KEY cert.type: 0?? Oct 12 13:34:18: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request Oct 12 13:34:18: | so do not send cert. Oct 12 13:34:18: | I did not send a certificate because digital signatures are not being used. (PSK) Oct 12 13:34:18: | **emit ISAKMP Message: Oct 12 13:34:18: | initiator cookie: Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | responder cookie: Oct 12 13:34:18: | 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_ID (0x5) Oct 12 13:34:18: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 12 13:34:18: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 12 13:34:18: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Oct 12 13:34:18: | message ID: 00 00 00 00 Oct 12 13:34:18: | ***emit ISAKMP Identification Payload (IPsec DOI): Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_HASH (0x8) Oct 12 13:34:18: | ID type: ID_IPV6_ADDR (0x5) Oct 12 13:34:18: | Protocol ID: 0 (0x0) Oct 12 13:34:18: | port: 0 (0x0) Oct 12 13:34:18: | emitting 16 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) Oct 12 13:34:18: | my identity 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 70 Oct 12 13:34:18: | emitting length of ISAKMP Identification Payload (IPsec DOI): 24 Oct 12 13:34:18: | hmac prf: init 0x7f5c1bd2a7f0 Oct 12 13:34:18: | hmac prf: init symkey symkey 0x7f5c10007210 (length 20) Oct 12 13:34:18: | hmac prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10007210) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10007210) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10006f70) bytes(0x7ffdf8372870/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10013530) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2ce90 (length 256) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10013530) bytes(0x7f5c1bd2ce90/256) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10013530) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | bytes: af 16 2e 45 66 1c 58 34 5b 5d f1 fa 1b 2b 04 3b Oct 12 13:34:18: | bytes: 17 3a c7 c1 be 3c e9 d6 15 cd 3e a9 a2 47 18 d1 Oct 12 13:34:18: | bytes: 8f 0f c4 99 f5 d9 0f a5 e4 b8 54 95 7e 87 f6 11 Oct 12 13:34:18: | bytes: d9 f1 9e e9 ec 76 46 9c b1 4f fc 42 5b 0d ee 38 Oct 12 13:34:18: | bytes: 13 f8 e2 a4 4b c5 49 ca 89 cd 8c 89 b5 92 8c 9f Oct 12 13:34:18: | bytes: a2 66 38 bf 2c 9d 5c 97 fc 35 77 62 f6 f0 a3 8d Oct 12 13:34:18: | bytes: 0d 2d 12 7d 50 bb 1d 27 5c 33 e1 2c 06 a8 ad d4 Oct 12 13:34:18: | bytes: d9 5c e9 09 72 44 87 76 c0 c3 30 23 b7 22 ba 71 Oct 12 13:34:18: | bytes: e0 a3 b3 79 0d 42 e0 f8 01 68 34 58 e2 a5 dc 03 Oct 12 13:34:18: | bytes: b4 d0 b0 6e 28 ab fc 5d 54 b6 33 bf df d8 63 10 Oct 12 13:34:18: | bytes: ca 85 3b 9e be c7 e4 d8 70 82 6b c7 a5 20 0f 8b Oct 12 13:34:18: | bytes: 17 3f 83 c9 bc 5b cc 0a a1 f6 cb 67 da 37 ea f3 Oct 12 13:34:18: | bytes: c3 46 29 8c 3f 92 92 13 f5 67 00 07 6e 27 cf 2e Oct 12 13:34:18: | bytes: ec f7 f3 5f cb f7 f6 e4 1d 11 4e 25 9c 75 fc 90 Oct 12 13:34:18: | bytes: ac 56 6b 96 36 31 19 bf 8e 3c eb ec 73 41 93 86 Oct 12 13:34:18: | bytes: 2d 62 c6 16 1a 29 95 ca ed dc 75 c7 a7 09 13 e1 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(320) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10013530 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2be30 (length 256) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1bd2be30/256) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(320) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 87 c1 ce 29 10 67 b4 ba 58 3c 04 cc e4 01 7d db Oct 12 13:34:18: | bytes: 2a 3e e2 eb 5d 12 6c da 7a 45 ca 38 f2 02 23 d8 Oct 12 13:34:18: | bytes: f8 54 9c b8 e2 1e 9b 86 e6 60 47 f7 9e ff 20 ed Oct 12 13:34:18: | bytes: 54 d8 22 25 55 a4 1e 6c 3f 2a 7a 97 16 7c 43 df Oct 12 13:34:18: | bytes: f0 18 59 7e a0 d8 ba a3 9b c0 e4 88 a9 dd 40 2f Oct 12 13:34:18: | bytes: fb 6d 77 2f 62 c5 0f 89 4f 48 ba 52 c5 20 08 eb Oct 12 13:34:18: | bytes: 15 02 f6 78 32 21 44 79 2a 6e 61 b5 c8 44 f7 79 Oct 12 13:34:18: | bytes: 4e be 95 27 94 f2 af 65 c2 aa a7 49 49 b2 f6 69 Oct 12 13:34:18: | bytes: 14 10 c4 ad 2f d3 c0 37 12 56 c0 24 20 5b e6 2c Oct 12 13:34:18: | bytes: af 73 54 9e b3 71 b5 8b cb 5c 63 87 9f 68 5f 1d Oct 12 13:34:18: | bytes: 95 04 7f d9 5c b5 86 4e ab fc 7e ea 29 2f 01 40 Oct 12 13:34:18: | bytes: d1 8f ed e4 6e fa 6d bb c2 cd 5c 3d f3 ca ad 81 Oct 12 13:34:18: | bytes: 04 98 8d 7d 0b a2 9a 88 b0 c4 76 19 43 d5 f8 4d Oct 12 13:34:18: | bytes: 51 81 ba 72 e8 29 5f a0 a5 e2 74 ae dd a3 ad 41 Oct 12 13:34:18: | bytes: 0f 10 23 48 ae 80 d7 87 3f 76 ac 74 64 b6 ad b8 Oct 12 13:34:18: | bytes: 26 9e 03 b4 8b 3c a4 fe b2 96 88 3b 02 9f 7b 9b Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10013530) length(576) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2c480 (length 8) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10013530) bytes(0x7f5c1bd2c480/8) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10013530) length(576) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(584) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10013530 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2c458 (length 8) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1bd2c458/8) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(584) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10013530) length(592) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hashing 640 bytes of SA Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2c7b4 (length 640) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10013530) bytes(0x7f5c1bd2c7b4/640) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10013530) length(592) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Oct 12 13:34:18: | bytes: 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 07 80 02 00 02 80 03 00 01 80 04 00 0e Oct 12 13:34:18: | bytes: 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Oct 12 13:34:18: | bytes: 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 01 Oct 12 13:34:18: | bytes: 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Oct 12 13:34:18: | bytes: 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 01 Oct 12 13:34:18: | bytes: 80 03 00 01 80 04 00 0e 80 0e 01 00 03 00 00 24 Oct 12 13:34:18: | bytes: 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Oct 12 13:34:18: | bytes: 80 02 00 01 80 03 00 01 80 04 00 0e 80 0e 00 80 Oct 12 13:34:18: | bytes: 03 00 00 20 04 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 0e Oct 12 13:34:18: | bytes: 03 00 00 20 05 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 0e Oct 12 13:34:18: | bytes: 03 00 00 24 06 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 07 80 02 00 02 80 03 00 01 80 04 00 05 Oct 12 13:34:18: | bytes: 80 0e 01 00 03 00 00 24 07 01 00 00 80 0b 00 01 Oct 12 13:34:18: | bytes: 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 01 Oct 12 13:34:18: | bytes: 80 04 00 05 80 0e 00 80 03 00 00 24 08 01 00 00 Oct 12 13:34:18: | bytes: 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 01 Oct 12 13:34:18: | bytes: 80 03 00 01 80 04 00 05 80 0e 01 00 03 00 00 24 Oct 12 13:34:18: | bytes: 09 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Oct 12 13:34:18: | bytes: 80 02 00 01 80 03 00 01 80 04 00 05 80 0e 00 80 Oct 12 13:34:18: | bytes: 03 00 00 20 0a 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 05 Oct 12 13:34:18: | bytes: 03 00 00 20 0b 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 05 Oct 12 13:34:18: | bytes: 03 00 00 24 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 07 80 02 00 02 80 03 00 01 80 04 00 02 Oct 12 13:34:18: | bytes: 80 0e 01 00 03 00 00 24 0d 01 00 00 80 0b 00 01 Oct 12 13:34:18: | bytes: 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 01 Oct 12 13:34:18: | bytes: 80 04 00 02 80 0e 00 80 03 00 00 24 0e 01 00 00 Oct 12 13:34:18: | bytes: 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 01 Oct 12 13:34:18: | bytes: 80 03 00 01 80 04 00 02 80 0e 01 00 03 00 00 24 Oct 12 13:34:18: | bytes: 0f 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Oct 12 13:34:18: | bytes: 80 02 00 01 80 03 00 01 80 04 00 02 80 0e 00 80 Oct 12 13:34:18: | bytes: 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 02 Oct 12 13:34:18: | bytes: 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Oct 12 13:34:18: | bytes: 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 02 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(1232) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10013530 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1b7fe400 (length 20) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1b7fe400/20) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(1232) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 05 00 00 00 20 01 04 70 dc 8c 10 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 28 00 70 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10013530) length(1252) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hmac prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c10013530) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10013530) length(1252) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c10013530 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10006f70) bytes(0x7ffdf8372850/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10013530) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10013530) symkey(2: 0x7f5c1000ea90) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10013530) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10010470) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10013530 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c1000ea90 Oct 12 13:34:18: | prf key: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c10010470) to bytes Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash 23 f6 6a a0 0f e3 a3 2b cd dd 40 75 03 51 45 55 Oct 12 13:34:18: | prf outer hash 32 ef e2 f4 Oct 12 13:34:18: | prf outer: free key 0x7f5c10010470 Oct 12 13:34:18: | prf final bytes 23 f6 6a a0 0f e3 a3 2b cd dd 40 75 03 51 45 55 Oct 12 13:34:18: | prf final bytes 32 ef e2 f4 Oct 12 13:34:18: | ***emit ISAKMP Hash Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_VID (0xd) Oct 12 13:34:18: | emitting 20 raw bytes of HASH_R into ISAKMP Hash Payload Oct 12 13:34:18: | HASH_R 23 f6 6a a0 0f e3 a3 2b cd dd 40 75 03 51 45 55 Oct 12 13:34:18: | HASH_R 32 ef e2 f4 Oct 12 13:34:18: | emitting length of ISAKMP Hash Payload: 24 Oct 12 13:34:18: | out_vid(): sending [CAN-IKEv2] Oct 12 13:34:18: | ***emit ISAKMP Vendor ID Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | emitting 5 raw bytes of V_ID into ISAKMP Vendor ID Payload Oct 12 13:34:18: | V_ID 49 4b 45 76 32 Oct 12 13:34:18: | emitting length of ISAKMP Vendor ID Payload: 9 Oct 12 13:34:18: | encrypting: 08 00 00 18 05 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:34:18: | encrypting: 00 00 00 00 00 28 00 70 0d 00 00 18 23 f6 6a a0 Oct 12 13:34:18: | encrypting: 0f e3 a3 2b cd dd 40 75 03 51 45 55 32 ef e2 f4 Oct 12 13:34:18: | encrypting: 00 00 00 09 49 4b 45 76 32 Oct 12 13:34:18: | IV: de fb 63 35 ca 83 43 a3 19 6c 74 bd 79 7d 14 d7 Oct 12 13:34:18: | unpadded size is: 57 Oct 12 13:34:18: | emitting 7 zero bytes of encryption padding into ISAKMP Message Oct 12 13:34:18: | encrypting 64 using OAKLEY_AES_CBC Oct 12 13:34:18: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:34:18: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:34:18: | next IV: 5d f7 19 b6 f4 28 d6 10 08 84 df ff cf 2d 5b e9 Oct 12 13:34:18: | no IKEv1 message padding required Oct 12 13:34:18: | emitting length of ISAKMP Message: 92 Oct 12 13:34:18: | last encrypted block of Phase 1: Oct 12 13:34:18: | 5d f7 19 b6 f4 28 d6 10 08 84 df ff cf 2d 5b e9 Oct 12 13:34:18: | complete v1 state transition with STF_OK Oct 12 13:34:18: "mytunnel" #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 Oct 12 13:34:18: | parent state #1: STATE_MAIN_R2(open-ike) > STATE_MAIN_R3(established-authenticated-ike) Oct 12 13:34:18: | ignore states: 0 Oct 12 13:34:18: | half-open-ike states: 0 Oct 12 13:34:18: | open-ike states: 0 Oct 12 13:34:18: | established-anonymous-ike states: 0 Oct 12 13:34:18: | established-authenticated-ike states: 1 Oct 12 13:34:18: | anonymous-ipsec states: 0 Oct 12 13:34:18: | authenticated-ipsec states: 0 Oct 12 13:34:18: | informational states: 0 Oct 12 13:34:18: | unknown states: 0 Oct 12 13:34:18: | category states: 1 count states: 1 Oct 12 13:34:18: | state: #1 requesting EVENT_v1_RETRANSMIT to be deleted Oct 12 13:34:18: | sending reply packet to 2001:470:dc8c:1000::28:60:500 (from port 500) Oct 12 13:34:18: | sending 92 bytes for STATE_MAIN_R2 through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #1) Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | 05 10 02 01 00 00 00 00 00 00 00 5c 73 74 35 99 Oct 12 13:34:18: | 60 92 39 6e ce 40 0d 16 2d a5 b1 66 fc 19 ef e0 Oct 12 13:34:18: | 5b fe 60 45 7c bc 67 0f de 17 67 b0 71 83 54 7f Oct 12 13:34:18: | d9 25 84 5a 88 97 f4 a4 d9 38 c0 65 5d f7 19 b6 Oct 12 13:34:18: | f4 28 d6 10 08 84 df ff cf 2d 5b e9 Oct 12 13:34:18: | event_schedule_ms called for about 3330000 ms Oct 12 13:34:18: | event_schedule_tv called for about 3330 seconds and change Oct 12 13:34:18: | inserting event EVENT_SA_REPLACE, timeout in 3330.000000 seconds for #1 Oct 12 13:34:18: "mytunnel" #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=PRESHARED_KEY cipher=aes_256 integ=sha group=MODP2048} Oct 12 13:34:18: | modecfg pull: noquirk policy:push not-client Oct 12 13:34:18: | phase 1 is done, looking for phase 2 to unpend Oct 12 13:34:18: | unpending state #1 Oct 12 13:34:18: | *received 476 bytes from 2001:470:dc8c:1000::28:60:500 on eth0 (port=500) Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | 08 10 20 01 ee ed 7e 06 00 00 01 dc 19 bb 95 45 Oct 12 13:34:18: | 2d e6 d8 38 bd 04 78 3f 80 9c 82 ae 27 02 0d 51 Oct 12 13:34:18: | f4 ae 60 a7 05 f7 6c d9 a9 75 cf 62 a1 40 02 2b Oct 12 13:34:18: | 86 4c c4 f9 11 d2 bf 74 1a c4 9d ef c2 5b 06 8a Oct 12 13:34:18: | 55 04 d0 66 75 1a bd a5 cd da 7b da 2f 61 bc 10 Oct 12 13:34:18: | 9a 9c 2e 5b af d6 7c 75 91 5e 0e f4 90 64 be 25 Oct 12 13:34:18: | 11 0c 6e 31 d7 5d af 4a a8 32 61 80 22 57 12 66 Oct 12 13:34:18: | 7d 63 d5 49 4e 62 a3 7b 4e 97 39 8b 57 6a 1f 0e Oct 12 13:34:18: | 0a 1d 17 54 e9 1b b0 75 5d 8f 28 c7 39 0f 1a 5b Oct 12 13:34:18: | 1a 90 ed 2a 44 43 e5 e4 df e2 b0 e0 59 c6 88 7e Oct 12 13:34:18: | c0 b6 f6 56 f6 a3 66 c0 bf 8b b4 08 42 a2 68 f6 Oct 12 13:34:18: | be c0 d3 8a 6b 3b 1a ad 75 32 9a d6 0b e7 f2 cc Oct 12 13:34:18: | 21 b0 5c ff 85 44 57 19 4d 17 41 bf 3a 79 09 9d Oct 12 13:34:18: | bf b1 9f c3 e2 b1 7c aa a2 8d 85 30 db cf 74 c6 Oct 12 13:34:18: | 3d a9 c2 0a 12 14 3b 6c 34 2f 58 56 c1 d1 30 c5 Oct 12 13:34:18: | d3 7d 4d 77 43 45 29 21 81 96 06 2a f4 a1 28 ee Oct 12 13:34:18: | b6 88 4d 97 61 c5 d8 f4 ee 44 a4 8c 98 25 ce 27 Oct 12 13:34:18: | 69 34 e6 f0 64 c9 2a 9b 86 5b 46 d0 24 de ad 31 Oct 12 13:34:18: | 3e ee ad 8b 3f 06 f0 11 5b 19 71 e3 51 f7 5d 84 Oct 12 13:34:18: | 4e 93 8b c4 7b c6 56 91 72 f9 42 7c 0e d7 42 c6 Oct 12 13:34:18: | 49 b9 15 61 16 d0 59 08 40 a3 20 e6 7d 81 42 52 Oct 12 13:34:18: | 9b 18 00 b1 b1 18 e7 36 66 e2 f8 34 16 a7 6a f0 Oct 12 13:34:18: | 85 0f 39 8f d1 28 d8 17 d4 0e de 54 85 6a 10 20 Oct 12 13:34:18: | 8e ab 9f c0 72 ab 99 cc ca eb ed 92 a7 7b d1 0e Oct 12 13:34:18: | f6 10 91 cb e4 94 00 e7 6e 11 d7 f9 81 21 25 17 Oct 12 13:34:18: | 40 69 b1 66 bf d7 32 77 f1 1c 12 da 89 2a 53 79 Oct 12 13:34:18: | 3f 36 74 1b a2 55 87 e0 30 02 e6 52 7c 3e 9a 8e Oct 12 13:34:18: | 2f 33 ac 52 ee 32 cc 37 45 bf b4 33 7e 29 fc 21 Oct 12 13:34:18: | 7f c5 0f 75 02 84 6a dd 1e 61 23 85 Oct 12 13:34:18: | **parse ISAKMP Message: Oct 12 13:34:18: | initiator cookie: Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | responder cookie: Oct 12 13:34:18: | 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_HASH (0x8) Oct 12 13:34:18: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 12 13:34:18: | exchange type: ISAKMP_XCHG_QUICK (0x20) Oct 12 13:34:18: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Oct 12 13:34:18: | message ID: ee ed 7e 06 Oct 12 13:34:18: | length: 476 (0x1dc) Oct 12 13:34:18: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) Oct 12 13:34:18: | finding hash chain in state hash table Oct 12 13:34:18: | ICOOKIE: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | RCOOKIE: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | found hash chain 7 Oct 12 13:34:18: | v1 peer and cookies match on #1, provided msgid eeed7e06 == 00000000 Oct 12 13:34:18: | v1 state object not found Oct 12 13:34:18: | finding hash chain in state hash table Oct 12 13:34:18: | ICOOKIE: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | RCOOKIE: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | found hash chain 7 Oct 12 13:34:18: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000 Oct 12 13:34:18: | v1 state object #1 found, in STATE_MAIN_R3 Oct 12 13:34:18: | processing connection "mytunnel" Oct 12 13:34:18: | last Phase 1 IV: 5d f7 19 b6 f4 28 d6 10 08 84 df ff cf 2d 5b e9 Oct 12 13:34:18: | current Phase 1 IV: 5d f7 19 b6 f4 28 d6 10 08 84 df ff cf 2d 5b e9 Oct 12 13:34:18: | computed Phase 2 IV: Oct 12 13:34:18: | c1 90 70 f2 74 eb 62 fe fb 08 11 ed df b5 c7 52 Oct 12 13:34:18: | 2b 74 74 aa Oct 12 13:34:18: | #1 state_busy:2221 st != NULL && st->st_calculating == FALSE; Oct 12 13:34:18: | received encrypted packet from 2001:470:dc8c:1000::28:60:500 Oct 12 13:34:18: | decrypting 448 bytes using algorithm OAKLEY_AES_CBC Oct 12 13:34:18: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:34:18: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:34:18: | decrypted: Oct 12 13:34:18: | 01 00 00 18 e8 ab 4a f2 2d f4 7f 27 40 d2 c9 d2 Oct 12 13:34:18: | 5a 25 cf ff a8 41 34 f1 0a 00 00 90 00 00 00 01 Oct 12 13:34:18: | 00 00 00 01 00 00 00 84 00 03 04 04 4b 90 77 58 Oct 12 13:34:18: | 03 00 00 20 00 0c 00 00 80 03 00 0e 80 04 00 01 Oct 12 13:34:18: | 80 01 00 01 80 02 70 80 80 05 00 02 80 06 00 80 Oct 12 13:34:18: | 03 00 00 20 01 0c 00 00 80 03 00 0e 80 04 00 01 Oct 12 13:34:18: | 80 01 00 01 80 02 70 80 80 05 00 01 80 06 00 80 Oct 12 13:34:18: | 03 00 00 1c 02 03 00 00 80 03 00 0e 80 04 00 01 Oct 12 13:34:18: | 80 01 00 01 80 02 70 80 80 05 00 02 00 00 00 1c Oct 12 13:34:18: | 03 03 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 Oct 12 13:34:18: | 80 02 70 80 80 05 00 01 04 00 00 14 e0 8f c7 d5 Oct 12 13:34:18: | 13 74 c6 a5 e5 9a 6f 2b fc d1 22 b2 00 00 01 04 Oct 12 13:34:18: | f1 1a bb 1b 85 ad 9e 7d 6e 59 da c5 81 8c 14 da Oct 12 13:34:18: | da d8 73 39 03 00 b7 01 a0 ed 9f 5b 37 50 0a 20 Oct 12 13:34:18: | 8a 19 cf ff 55 d2 a6 8b 51 c3 e8 53 e0 73 b4 21 Oct 12 13:34:18: | e6 cf e4 4a 88 7e 23 c0 93 af f1 bd b1 3b b4 f3 Oct 12 13:34:18: | cd 12 c3 ce de 3b 1a 55 b4 c6 3e 25 47 36 a8 c6 Oct 12 13:34:18: | a3 44 97 a1 75 d8 15 e5 6b 03 df d3 64 50 3e 78 Oct 12 13:34:18: | b3 6b dd 0c af 4e c7 9e a4 78 b9 56 48 87 3f 47 Oct 12 13:34:18: | 4b 3f 1b b3 61 c1 6e be 87 cb a3 0d 71 48 7c d3 Oct 12 13:34:18: | 86 c9 68 f6 64 e7 7b ea 2f 38 e2 05 a3 d9 b0 61 Oct 12 13:34:18: | d2 54 15 13 e3 af c6 81 2e 77 cc 98 fa 17 94 7a Oct 12 13:34:18: | 1d 26 9b 71 96 5d 31 78 e5 c7 1b 07 c5 0e 5f 5e Oct 12 13:34:18: | 61 25 c2 e6 64 73 bd 91 d5 40 72 97 fe c4 e2 8d Oct 12 13:34:18: | 94 eb 03 21 06 82 86 57 ee 9a ab ba fa c3 cb 80 Oct 12 13:34:18: | 29 02 66 4a 24 aa d4 1b f1 63 1c ab c4 83 eb fe Oct 12 13:34:18: | c8 79 ed 81 22 7b 03 a9 39 3b 16 89 fb 9f d5 ae Oct 12 13:34:18: | a4 53 6c e4 53 bd 88 7b e5 95 75 a3 26 20 42 a4 Oct 12 13:34:18: | next IV: 7e 29 fc 21 7f c5 0f 75 02 84 6a dd 1e 61 23 85 Oct 12 13:34:18: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502opt: 0x200030 Oct 12 13:34:18: | ***parse ISAKMP Hash Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 12 13:34:18: | length: 24 (0x18) Oct 12 13:34:18: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402opt: 0x200030 Oct 12 13:34:18: | ***parse ISAKMP Security Association Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONCE (0xa) Oct 12 13:34:18: | length: 144 (0x90) Oct 12 13:34:18: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 12 13:34:18: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x200030 Oct 12 13:34:18: | ***parse ISAKMP Nonce Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_KE (0x4) Oct 12 13:34:18: | length: 20 (0x14) Oct 12 13:34:18: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0opt: 0x200030 Oct 12 13:34:18: | ***parse ISAKMP Key Exchange Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | length: 260 (0x104) Oct 12 13:34:18: | hmac prf: init 0x7f5c1bd2a7f0 Oct 12 13:34:18: | hmac prf: init symkey symkey 0x7f5c1000b990 (length 20) Oct 12 13:34:18: | hmac prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000b990) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000b990) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10010470) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10010470) bytes(0x7ffdf8372a00/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2ad94 (length 4) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10006f70) bytes(0x7f5c1bd2ad94/4) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | bytes: ee ed 7e 06 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(68) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10006f70 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2ca74 (length 424) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1bd2ca74/424) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(68) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 0a 00 00 90 00 00 00 01 00 00 00 01 00 00 00 84 Oct 12 13:34:18: | bytes: 00 03 04 04 4b 90 77 58 03 00 00 20 00 0c 00 00 Oct 12 13:34:18: | bytes: 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 Oct 12 13:34:18: | bytes: 80 05 00 02 80 06 00 80 03 00 00 20 01 0c 00 00 Oct 12 13:34:18: | bytes: 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 Oct 12 13:34:18: | bytes: 80 05 00 01 80 06 00 80 03 00 00 1c 02 03 00 00 Oct 12 13:34:18: | bytes: 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 Oct 12 13:34:18: | bytes: 80 05 00 02 00 00 00 1c 03 03 00 00 80 03 00 0e Oct 12 13:34:18: | bytes: 80 04 00 01 80 01 00 01 80 02 70 80 80 05 00 01 Oct 12 13:34:18: | bytes: 04 00 00 14 e0 8f c7 d5 13 74 c6 a5 e5 9a 6f 2b Oct 12 13:34:18: | bytes: fc d1 22 b2 00 00 01 04 f1 1a bb 1b 85 ad 9e 7d Oct 12 13:34:18: | bytes: 6e 59 da c5 81 8c 14 da da d8 73 39 03 00 b7 01 Oct 12 13:34:18: | bytes: a0 ed 9f 5b 37 50 0a 20 8a 19 cf ff 55 d2 a6 8b Oct 12 13:34:18: | bytes: 51 c3 e8 53 e0 73 b4 21 e6 cf e4 4a 88 7e 23 c0 Oct 12 13:34:18: | bytes: 93 af f1 bd b1 3b b4 f3 cd 12 c3 ce de 3b 1a 55 Oct 12 13:34:18: | bytes: b4 c6 3e 25 47 36 a8 c6 a3 44 97 a1 75 d8 15 e5 Oct 12 13:34:18: | bytes: 6b 03 df d3 64 50 3e 78 b3 6b dd 0c af 4e c7 9e Oct 12 13:34:18: | bytes: a4 78 b9 56 48 87 3f 47 4b 3f 1b b3 61 c1 6e be Oct 12 13:34:18: | bytes: 87 cb a3 0d 71 48 7c d3 86 c9 68 f6 64 e7 7b ea Oct 12 13:34:18: | bytes: 2f 38 e2 05 a3 d9 b0 61 d2 54 15 13 e3 af c6 81 Oct 12 13:34:18: | bytes: 2e 77 cc 98 fa 17 94 7a 1d 26 9b 71 96 5d 31 78 Oct 12 13:34:18: | bytes: e5 c7 1b 07 c5 0e 5f 5e 61 25 c2 e6 64 73 bd 91 Oct 12 13:34:18: | bytes: d5 40 72 97 fe c4 e2 8d 94 eb 03 21 06 82 86 57 Oct 12 13:34:18: | bytes: ee 9a ab ba fa c3 cb 80 29 02 66 4a 24 aa d4 1b Oct 12 13:34:18: | bytes: f1 63 1c ab c4 83 eb fe c8 79 ed 81 22 7b 03 a9 Oct 12 13:34:18: | bytes: 39 3b 16 89 fb 9f d5 ae a4 53 6c e4 53 bd 88 7b Oct 12 13:34:18: | bytes: e5 95 75 a3 26 20 42 a4 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(492) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hmac prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c10006f70) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(492) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c10006f70 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10010470) bytes(0x7ffdf83729e0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c1000ea90) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10013530) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c1000ea90 Oct 12 13:34:18: | prf key: free key 0x7f5c10010470 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c10013530) to bytes Oct 12 13:34:18: | symkey: key(0x7f5c10013530) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash e8 ab 4a f2 2d f4 7f 27 40 d2 c9 d2 5a 25 cf ff Oct 12 13:34:18: | prf outer hash a8 41 34 f1 Oct 12 13:34:18: | prf outer: free key 0x7f5c10013530 Oct 12 13:34:18: | prf final bytes e8 ab 4a f2 2d f4 7f 27 40 d2 c9 d2 5a 25 cf ff Oct 12 13:34:18: | prf final bytes a8 41 34 f1 Oct 12 13:34:18: | HASH(1) computed: Oct 12 13:34:18: | e8 ab 4a f2 2d f4 7f 27 40 d2 c9 d2 5a 25 cf ff Oct 12 13:34:18: | a8 41 34 f1 Oct 12 13:34:18: "mytunnel" #1: the peer proposed: 2001:470:dc8c:1000::28:70/128:0/0 -> 2001:470:dc8c:1000::28:60/128:0/0 Oct 12 13:34:18: | find_client_connection starting with mytunnel Oct 12 13:34:18: | looking for 2001:470:dc8c:1000::28:70/128:0/0 -> 2001:470:dc8c:1000::28:60/128:0/0 Oct 12 13:34:18: | concrete checking against sr#0 2001:470:dc8c:1000::28:70/128 -> 2001:470:dc8c:1000::28:60/128 Oct 12 13:34:18: | match_id a=2001:470:dc8c:1000::28:60 Oct 12 13:34:18: | b=2001:470:dc8c:1000::28:60 Oct 12 13:34:18: | results matched Oct 12 13:34:18: | trusted_ca_nss called with a=(empty) b=(empty) Oct 12 13:34:18: | fc_try trying mytunnel:2001:470:dc8c:1000::28:70/128:0/0 -> 2001:470:dc8c:1000::28:60/128:0/0 vs mytunnel:2001:470:dc8c:1000::28:70/128:0/0 -> 2001:470:dc8c:1000::28:60/128:0/0 Oct 12 13:34:18: | fc_try concluding with mytunnel [128] Oct 12 13:34:18: | fc_try mytunnel gives mytunnel Oct 12 13:34:18: | concluding with d = mytunnel Oct 12 13:34:18: | client wildcard: no port wildcard: no virtual: no Oct 12 13:34:18: | creating state object #2 at 0x7f5c1bd2d200 Oct 12 13:34:18: | parent state #2: new > STATE_UNDEFINED(ignore) Oct 12 13:34:18: | duplicating state object #1 as #2 Oct 12 13:34:18: | processing connection "mytunnel" Oct 12 13:34:18: | child state #2: STATE_UNDEFINED(ignore) > STATE_QUICK_R0(authenticated-ipsec) Oct 12 13:34:18: | ignore states: 0 Oct 12 13:34:18: | half-open-ike states: 0 Oct 12 13:34:18: | open-ike states: 0 Oct 12 13:34:18: | established-anonymous-ike states: 0 Oct 12 13:34:18: | established-authenticated-ike states: 1 Oct 12 13:34:18: | anonymous-ipsec states: 0 Oct 12 13:34:18: | authenticated-ipsec states: 1 Oct 12 13:34:18: | informational states: 0 Oct 12 13:34:18: | unknown states: 0 Oct 12 13:34:18: | category states: 2 count states: 2 Oct 12 13:34:18: | inserting state object #2 Oct 12 13:34:18: | finding hash chain in state hash table Oct 12 13:34:18: | ICOOKIE: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | RCOOKIE: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | found hash chain 7 Oct 12 13:34:18: | list 0x7f5c1b7ee280 first entry 0x7f5c1bd2c648 Oct 12 13:34:18: | inserted state 0x7f5c1bd2d200 entry 0x7f5c1bd2d868 next 0x7f5c1bd2c648 prev-next 0x7f5c1b7ee280 into list Oct 12 13:34:18: | updated next state 0x7f5c1bd2bfe0 entry 0x7f5c1bd2c648 next (nil) prev-next 0x7f5c1bd2d868 Oct 12 13:34:18: | finding hash chain in icookie hash table Oct 12 13:34:18: | ICOOKIE: 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | RCOOKIE: 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | found hash chain 28 Oct 12 13:34:18: | list 0x7f5c1b7ee448 first entry 0x7f5c1bd2c660 Oct 12 13:34:18: | inserted state 0x7f5c1bd2d200 entry 0x7f5c1bd2d880 next 0x7f5c1bd2c660 prev-next 0x7f5c1b7ee448 into list Oct 12 13:34:18: | updated next state 0x7f5c1bd2bfe0 entry 0x7f5c1bd2c660 next (nil) prev-next 0x7f5c1bd2d880 Oct 12 13:34:18: | event_schedule called for 0 seconds Oct 12 13:34:18: | event_schedule_tv called for about 0 seconds and change Oct 12 13:34:18: | inserting event EVENT_SO_DISCARD, timeout in 0.000000 seconds for #2 Oct 12 13:34:18: | ****parse IPsec DOI SIT: Oct 12 13:34:18: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 12 13:34:18: | ****parse ISAKMP Proposal Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | length: 132 (0x84) Oct 12 13:34:18: | proposal number: 0 (0x0) Oct 12 13:34:18: | protocol ID: PROTO_IPSEC_ESP (0x3) Oct 12 13:34:18: | SPI size: 4 (0x4) Oct 12 13:34:18: | number of transforms: 4 (0x4) Oct 12 13:34:18: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI Oct 12 13:34:18: | SPI 4b 90 77 58 Oct 12 13:34:18: | *****parse ISAKMP Transform Payload (ESP): Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_T (0x3) Oct 12 13:34:18: | length: 32 (0x20) Oct 12 13:34:18: | ESP transform number: 0 (0x0) Oct 12 13:34:18: | ESP transform ID: ESP_AES (0xc) Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: GROUP_DESCRIPTION (0x8003) Oct 12 13:34:18: | length/value: 14 (0xe) Oct 12 13:34:18: | [14 is OAKLEY_GROUP_MODP2048] Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: ENCAPSULATION_MODE (0x8004) Oct 12 13:34:18: | length/value: 1 (0x1) Oct 12 13:34:18: | [1 is ENCAPSULATION_MODE_TUNNEL] Oct 12 13:34:18: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: SA_LIFE_TYPE (0x8001) Oct 12 13:34:18: | length/value: 1 (0x1) Oct 12 13:34:18: | [1 is SA_LIFE_TYPE_SECONDS] Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: SA_LIFE_DURATION (0x8002) Oct 12 13:34:18: | length/value: 28800 (0x7080) Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: AUTH_ALGORITHM (0x8005) Oct 12 13:34:18: | length/value: 2 (0x2) Oct 12 13:34:18: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: KEY_LENGTH (0x8006) Oct 12 13:34:18: | length/value: 128 (0x80) Oct 12 13:34:18: | check_kernel_encrypt_alg(12,128): OK Oct 12 13:34:18: | DH public value received: Oct 12 13:34:18: | f1 1a bb 1b 85 ad 9e 7d 6e 59 da c5 81 8c 14 da Oct 12 13:34:18: | da d8 73 39 03 00 b7 01 a0 ed 9f 5b 37 50 0a 20 Oct 12 13:34:18: | 8a 19 cf ff 55 d2 a6 8b 51 c3 e8 53 e0 73 b4 21 Oct 12 13:34:18: | e6 cf e4 4a 88 7e 23 c0 93 af f1 bd b1 3b b4 f3 Oct 12 13:34:18: | cd 12 c3 ce de 3b 1a 55 b4 c6 3e 25 47 36 a8 c6 Oct 12 13:34:18: | a3 44 97 a1 75 d8 15 e5 6b 03 df d3 64 50 3e 78 Oct 12 13:34:18: | b3 6b dd 0c af 4e c7 9e a4 78 b9 56 48 87 3f 47 Oct 12 13:34:18: | 4b 3f 1b b3 61 c1 6e be 87 cb a3 0d 71 48 7c d3 Oct 12 13:34:18: | 86 c9 68 f6 64 e7 7b ea 2f 38 e2 05 a3 d9 b0 61 Oct 12 13:34:18: | d2 54 15 13 e3 af c6 81 2e 77 cc 98 fa 17 94 7a Oct 12 13:34:18: | 1d 26 9b 71 96 5d 31 78 e5 c7 1b 07 c5 0e 5f 5e Oct 12 13:34:18: | 61 25 c2 e6 64 73 bd 91 d5 40 72 97 fe c4 e2 8d Oct 12 13:34:18: | 94 eb 03 21 06 82 86 57 ee 9a ab ba fa c3 cb 80 Oct 12 13:34:18: | 29 02 66 4a 24 aa d4 1b f1 63 1c ab c4 83 eb fe Oct 12 13:34:18: | c8 79 ed 81 22 7b 03 a9 39 3b 16 89 fb 9f d5 ae Oct 12 13:34:18: | a4 53 6c e4 53 bd 88 7b e5 95 75 a3 26 20 42 a4 Oct 12 13:34:18: | crypto helper 0: pcw_work: 0 Oct 12 13:34:18: | asking crypto helper 0 to do build KE and nonce; request ID 3 (len=2776, pcw_work=0) Oct 12 13:34:18: | #2 send_crypto_helper_request:613 st->st_calculating = TRUE; Oct 12 13:34:18: | state: #2 requesting EVENT_SO_DISCARD to be deleted Oct 12 13:34:18: | event_schedule called for 60 seconds Oct 12 13:34:18: | event_schedule_tv called for about 60 seconds and change Oct 12 13:34:18: | inserting event EVENT_CRYPTO_FAILED, timeout in 60.000000 seconds for #2 Oct 12 13:34:18: | complete v1 state transition with STF_SUSPEND Oct 12 13:34:18: | crypto helper 0 read fd: 12 Oct 12 13:34:18: | crypto helper 0 doing build KE and nonce; request ID 3 Oct 12 13:34:18: | NSS: Value of Prime: Oct 12 13:34:18: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 Oct 12 13:34:18: | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 Oct 12 13:34:18: | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd Oct 12 13:34:18: | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 Oct 12 13:34:18: | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 Oct 12 13:34:18: | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed Oct 12 13:34:18: | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 Oct 12 13:34:18: | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 Oct 12 13:34:18: | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f Oct 12 13:34:18: | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb Oct 12 13:34:18: | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 Oct 12 13:34:18: | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b Oct 12 13:34:18: | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f Oct 12 13:34:18: | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 Oct 12 13:34:18: | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 Oct 12 13:34:18: | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff Oct 12 13:34:18: | NSS: Value of base: 02 Oct 12 13:34:18: | NSS: generated dh priv and pub keys: 256 Oct 12 13:34:18: | NSS: Local DH secret (pointer): 0x7f5c10016610 Oct 12 13:34:18: | NSS: Public DH value sent(computed in NSS): Oct 12 13:34:18: | 16 01 70 d4 ca e2 c8 bd 91 80 3a 08 7a b4 58 a8 Oct 12 13:34:18: | 6a 35 cc c5 2e c1 72 7d 0a ae 2d 1f b6 d7 1b 8e Oct 12 13:34:18: | 0d e1 59 af 0b fb a8 9b 93 5e 07 c5 b3 3b e3 1d Oct 12 13:34:18: | 68 ba 00 8c 55 ef e2 94 1f 17 a9 8b ed f7 dc 0b Oct 12 13:34:18: | 04 13 0e 61 e2 a1 5e 70 02 4c c9 e2 33 b1 3f c7 Oct 12 13:34:18: | 0b 22 3e 8a 76 b5 68 6e a2 cd a5 5b 54 bb 2a 57 Oct 12 13:34:18: | 5c 29 5f c0 6c e7 c3 1f 4d 02 01 47 14 7b 09 a1 Oct 12 13:34:18: | 7d 77 01 90 d1 e6 4c 83 62 59 2d 82 d6 90 42 7d Oct 12 13:34:18: | d3 44 2d 05 a7 88 85 51 17 75 a5 14 8d 7a c6 52 Oct 12 13:34:18: | c4 87 f6 ff f1 ec c9 ad 1a 7b 97 1c f1 95 eb 3b Oct 12 13:34:18: | 41 df c9 52 f8 9a 09 86 ce 85 1a e1 94 9c 9d 20 Oct 12 13:34:18: | 6b 84 08 5a 5b 78 34 15 e9 17 b9 10 77 f6 db 6c Oct 12 13:34:18: | b1 13 bd 75 fc 24 f1 85 46 2b 78 96 1c 08 7a 15 Oct 12 13:34:18: | 58 19 60 38 85 ea f5 ac 9e fd 34 82 60 a9 c0 2c Oct 12 13:34:18: | b1 e7 e2 80 5b 5d 50 ec 11 f0 e2 0a 04 d3 ca f1 Oct 12 13:34:18: | aa cf c4 78 29 50 68 c8 e2 56 ed 4f ab f1 c1 ec Oct 12 13:34:18: | NSS: Local DH public value (pointer): 0x7f5c10015e00 Oct 12 13:34:18: | Generated nonce: 24 da 47 92 d7 34 9b 94 85 36 ee 5d 8c af 2c 73 Oct 12 13:34:18: | crypto helper 0 finished build KE and nonce; request ID 3 time elapsed 2291 usec Oct 12 13:34:18: | crypto helper 0 has finished work (pcw_work now 1) Oct 12 13:34:18: | crypto helper 0 replies to request ID 3 Oct 12 13:34:18: | calling continuation function 0x7f5c1b531980 Oct 12 13:34:18: | quick_inI1_outR1_cryptocontinue1 for #2: calculated ke+nonce, calculating DH Oct 12 13:34:18: | processing connection "mytunnel" Oct 12 13:34:18: | #2 quick_inI1_outR1_cryptocontinue1:2202 st->st_calculating = FALSE; Oct 12 13:34:18: | saving DH priv (local secret) and pub key into state struct Oct 12 13:34:18: | started looking for secret for 2001:470:dc8c:1000::28:70->2001:470:dc8c:1000::28:60 of kind PPK_PSK Oct 12 13:34:18: | actually looking for secret for 2001:470:dc8c:1000::28:70->2001:470:dc8c:1000::28:60 of kind PPK_PSK Oct 12 13:34:18: | line 1: key type PPK_PSK(2001:470:dc8c:1000::28:70) to type PPK_PSK Oct 12 13:34:18: | 1: compared key 2001:470:dc8c:1000::28:70 to 2001:470:dc8c:1000::28:70 / 2001:470:dc8c:1000::28:60 -> 8 Oct 12 13:34:18: | 2: compared key 2001:470:dc8c:1000::28:60 to 2001:470:dc8c:1000::28:70 / 2001:470:dc8c:1000::28:60 -> 12 Oct 12 13:34:18: | line 1: match=12 Oct 12 13:34:18: | best_match 0>12 best=0x7f5c1bd2a5c0 (line=1) Oct 12 13:34:18: | concluding with best_match=12 best=0x7f5c1bd2a5c0 (lineno=1) Oct 12 13:34:18: | Copying DH pub key pointer to be sent to a thread helper Oct 12 13:34:18: | crypto helper 0: pcw_work: 0 Oct 12 13:34:18: | asking crypto helper 0 to do compute dh (V1 Phase 2 PFS); request ID 4 (len=2776, pcw_work=0) Oct 12 13:34:18: | #2 send_crypto_helper_request:613 st->st_calculating = TRUE; Oct 12 13:34:18: | state: #2 requesting EVENT_CRYPTO_FAILED to be deleted Oct 12 13:34:18: | event_schedule called for 60 seconds Oct 12 13:34:18: | event_schedule_tv called for about 60 seconds and change Oct 12 13:34:18: | inserting event EVENT_CRYPTO_FAILED, timeout in 60.000000 seconds for #2 Oct 12 13:34:18: | crypto helper 0 read fd: 12 Oct 12 13:34:18: | crypto helper 0 doing compute dh (V1 Phase 2 PFS); request ID 4 Oct 12 13:34:18: | peer's g: f1 1a bb 1b 85 ad 9e 7d 6e 59 da c5 81 8c 14 da Oct 12 13:34:18: | peer's g: da d8 73 39 03 00 b7 01 a0 ed 9f 5b 37 50 0a 20 Oct 12 13:34:18: | peer's g: 8a 19 cf ff 55 d2 a6 8b 51 c3 e8 53 e0 73 b4 21 Oct 12 13:34:18: | peer's g: e6 cf e4 4a 88 7e 23 c0 93 af f1 bd b1 3b b4 f3 Oct 12 13:34:18: | peer's g: cd 12 c3 ce de 3b 1a 55 b4 c6 3e 25 47 36 a8 c6 Oct 12 13:34:18: | peer's g: a3 44 97 a1 75 d8 15 e5 6b 03 df d3 64 50 3e 78 Oct 12 13:34:18: | peer's g: b3 6b dd 0c af 4e c7 9e a4 78 b9 56 48 87 3f 47 Oct 12 13:34:18: | peer's g: 4b 3f 1b b3 61 c1 6e be 87 cb a3 0d 71 48 7c d3 Oct 12 13:34:18: | peer's g: 86 c9 68 f6 64 e7 7b ea 2f 38 e2 05 a3 d9 b0 61 Oct 12 13:34:18: | peer's g: d2 54 15 13 e3 af c6 81 2e 77 cc 98 fa 17 94 7a Oct 12 13:34:18: | peer's g: 1d 26 9b 71 96 5d 31 78 e5 c7 1b 07 c5 0e 5f 5e Oct 12 13:34:18: | peer's g: 61 25 c2 e6 64 73 bd 91 d5 40 72 97 fe c4 e2 8d Oct 12 13:34:18: | peer's g: 94 eb 03 21 06 82 86 57 ee 9a ab ba fa c3 cb 80 Oct 12 13:34:18: | peer's g: 29 02 66 4a 24 aa d4 1b f1 63 1c ab c4 83 eb fe Oct 12 13:34:18: | peer's g: c8 79 ed 81 22 7b 03 a9 39 3b 16 89 fb 9f d5 ae Oct 12 13:34:18: | peer's g: a4 53 6c e4 53 bd 88 7b e5 95 75 a3 26 20 42 a4 Oct 12 13:34:18: | Started DH shared-secret computation in NSS: Oct 12 13:34:18: | crypto helper 0 finished compute dh (V1 Phase 2 PFS); request ID 4 time elapsed 2011 usec Oct 12 13:34:18: | crypto helper 0 has finished work (pcw_work now 1) Oct 12 13:34:18: | crypto helper 0 replies to request ID 4 Oct 12 13:34:18: | calling continuation function 0x7f5c1b531c00 Oct 12 13:34:18: | quick_inI1_outR1_cryptocontinue2 for #2: calculated DH, sending R1 Oct 12 13:34:18: | processing connection "mytunnel" Oct 12 13:34:18: | #2 quick_inI1_outR1_cryptocontinue2:2289 st->st_calculating = FALSE; Oct 12 13:34:18: | **emit ISAKMP Message: Oct 12 13:34:18: | initiator cookie: Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa Oct 12 13:34:18: | responder cookie: Oct 12 13:34:18: | 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_HASH (0x8) Oct 12 13:34:18: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 12 13:34:18: | exchange type: ISAKMP_XCHG_QUICK (0x20) Oct 12 13:34:18: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Oct 12 13:34:18: | message ID: ee ed 7e 06 Oct 12 13:34:18: | ***emit ISAKMP Hash Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 12 13:34:18: | emitting 20 zero bytes of HASH into ISAKMP Hash Payload Oct 12 13:34:18: | emitting length of ISAKMP Hash Payload: 24 Oct 12 13:34:18: | ***emit ISAKMP Security Association Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONCE (0xa) Oct 12 13:34:18: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 12 13:34:18: | ****parse IPsec DOI SIT: Oct 12 13:34:18: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 12 13:34:18: | ****parse ISAKMP Proposal Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | length: 132 (0x84) Oct 12 13:34:18: | proposal number: 0 (0x0) Oct 12 13:34:18: | protocol ID: PROTO_IPSEC_ESP (0x3) Oct 12 13:34:18: | SPI size: 4 (0x4) Oct 12 13:34:18: | number of transforms: 4 (0x4) Oct 12 13:34:18: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI Oct 12 13:34:18: | SPI 4b 90 77 58 Oct 12 13:34:18: | *****parse ISAKMP Transform Payload (ESP): Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_T (0x3) Oct 12 13:34:18: | length: 32 (0x20) Oct 12 13:34:18: | ESP transform number: 0 (0x0) Oct 12 13:34:18: | ESP transform ID: ESP_AES (0xc) Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: GROUP_DESCRIPTION (0x8003) Oct 12 13:34:18: | length/value: 14 (0xe) Oct 12 13:34:18: | [14 is OAKLEY_GROUP_MODP2048] Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: ENCAPSULATION_MODE (0x8004) Oct 12 13:34:18: | length/value: 1 (0x1) Oct 12 13:34:18: | [1 is ENCAPSULATION_MODE_TUNNEL] Oct 12 13:34:18: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: SA_LIFE_TYPE (0x8001) Oct 12 13:34:18: | length/value: 1 (0x1) Oct 12 13:34:18: | [1 is SA_LIFE_TYPE_SECONDS] Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: SA_LIFE_DURATION (0x8002) Oct 12 13:34:18: | length/value: 28800 (0x7080) Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: AUTH_ALGORITHM (0x8005) Oct 12 13:34:18: | length/value: 2 (0x2) Oct 12 13:34:18: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Oct 12 13:34:18: | ******parse ISAKMP IPsec DOI attribute: Oct 12 13:34:18: | af+type: KEY_LENGTH (0x8006) Oct 12 13:34:18: | length/value: 128 (0x80) Oct 12 13:34:18: | check_kernel_encrypt_alg(12,128): OK Oct 12 13:34:18: | ****emit IPsec DOI SIT: Oct 12 13:34:18: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 12 13:34:18: | ****emit ISAKMP Proposal Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | proposal number: 0 (0x0) Oct 12 13:34:18: | protocol ID: PROTO_IPSEC_ESP (0x3) Oct 12 13:34:18: | SPI size: 4 (0x4) Oct 12 13:34:18: | number of transforms: 1 (0x1) Oct 12 13:34:18: | generate SPI: 10 73 0d 1b Oct 12 13:34:18: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload Oct 12 13:34:18: | SPI 10 73 0d 1b Oct 12 13:34:18: | *****emit ISAKMP Transform Payload (ESP): Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | ESP transform number: 0 (0x0) Oct 12 13:34:18: | ESP transform ID: ESP_AES (0xc) Oct 12 13:34:18: | emitting 24 raw bytes of attributes into ISAKMP Transform Payload (ESP) Oct 12 13:34:18: | attributes 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 Oct 12 13:34:18: | attributes 80 05 00 02 80 06 00 80 Oct 12 13:34:18: | emitting length of ISAKMP Transform Payload (ESP): 32 Oct 12 13:34:18: | emitting length of ISAKMP Proposal Payload: 44 Oct 12 13:34:18: | emitting length of ISAKMP Security Association Payload: 56 Oct 12 13:34:18: "mytunnel" #2: responding to Quick Mode proposal {msgid:067eedee} Oct 12 13:34:18: "mytunnel" #2: us: 2001:470:dc8c:1000::28:70<2001:470:dc8c:1000::28:70> Oct 12 13:34:18: "mytunnel" #2: them: 2001:470:dc8c:1000::28:60<2001:470:dc8c:1000::28:60> Oct 12 13:34:18: | ***emit ISAKMP Nonce Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_KE (0x4) Oct 12 13:34:18: | emitting 16 raw bytes of Nr into ISAKMP Nonce Payload Oct 12 13:34:18: | Nr 24 da 47 92 d7 34 9b 94 85 36 ee 5d 8c af 2c 73 Oct 12 13:34:18: | emitting length of ISAKMP Nonce Payload: 20 Oct 12 13:34:18: | ***emit ISAKMP Key Exchange Payload: Oct 12 13:34:18: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:18: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Oct 12 13:34:18: | keyex value 16 01 70 d4 ca e2 c8 bd 91 80 3a 08 7a b4 58 a8 Oct 12 13:34:18: | keyex value 6a 35 cc c5 2e c1 72 7d 0a ae 2d 1f b6 d7 1b 8e Oct 12 13:34:18: | keyex value 0d e1 59 af 0b fb a8 9b 93 5e 07 c5 b3 3b e3 1d Oct 12 13:34:18: | keyex value 68 ba 00 8c 55 ef e2 94 1f 17 a9 8b ed f7 dc 0b Oct 12 13:34:18: | keyex value 04 13 0e 61 e2 a1 5e 70 02 4c c9 e2 33 b1 3f c7 Oct 12 13:34:18: | keyex value 0b 22 3e 8a 76 b5 68 6e a2 cd a5 5b 54 bb 2a 57 Oct 12 13:34:18: | keyex value 5c 29 5f c0 6c e7 c3 1f 4d 02 01 47 14 7b 09 a1 Oct 12 13:34:18: | keyex value 7d 77 01 90 d1 e6 4c 83 62 59 2d 82 d6 90 42 7d Oct 12 13:34:18: | keyex value d3 44 2d 05 a7 88 85 51 17 75 a5 14 8d 7a c6 52 Oct 12 13:34:18: | keyex value c4 87 f6 ff f1 ec c9 ad 1a 7b 97 1c f1 95 eb 3b Oct 12 13:34:18: | keyex value 41 df c9 52 f8 9a 09 86 ce 85 1a e1 94 9c 9d 20 Oct 12 13:34:18: | keyex value 6b 84 08 5a 5b 78 34 15 e9 17 b9 10 77 f6 db 6c Oct 12 13:34:18: | keyex value b1 13 bd 75 fc 24 f1 85 46 2b 78 96 1c 08 7a 15 Oct 12 13:34:18: | keyex value 58 19 60 38 85 ea f5 ac 9e fd 34 82 60 a9 c0 2c Oct 12 13:34:18: | keyex value b1 e7 e2 80 5b 5d 50 ec 11 f0 e2 0a 04 d3 ca f1 Oct 12 13:34:18: | keyex value aa cf c4 78 29 50 68 c8 e2 56 ed 4f ab f1 c1 ec Oct 12 13:34:18: | emitting length of ISAKMP Key Exchange Payload: 260 Oct 12 13:34:18: | hmac prf: init 0x7f5c1bd2bdd0 Oct 12 13:34:18: | hmac prf: init symkey symkey 0x7f5c1000b990 (length 20) Oct 12 13:34:18: | hmac prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000b990) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000b990) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10010470) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10010470) bytes(0x7ffdf8372080/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c1000ea90) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2d540 (length 4) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1bd2d540/4) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | bytes: ee ed 7e 06 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(68) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2a7f0 (length 16) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10006f70) bytes(0x7f5c1bd2a7f0/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(68) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: e0 8f c7 d5 13 74 c6 a5 e5 9a 6f 2b fc d1 22 b2 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10006f70 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1b7fe414 (length 336) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1b7fe414/336) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 0a 00 00 38 00 00 00 01 00 00 00 01 00 00 00 2c Oct 12 13:34:18: | bytes: 00 03 04 01 10 73 0d 1b 00 00 00 20 00 0c 00 00 Oct 12 13:34:18: | bytes: 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 Oct 12 13:34:18: | bytes: 80 05 00 02 80 06 00 80 04 00 00 14 24 da 47 92 Oct 12 13:34:18: | bytes: d7 34 9b 94 85 36 ee 5d 8c af 2c 73 00 00 01 04 Oct 12 13:34:18: | bytes: 16 01 70 d4 ca e2 c8 bd 91 80 3a 08 7a b4 58 a8 Oct 12 13:34:18: | bytes: 6a 35 cc c5 2e c1 72 7d 0a ae 2d 1f b6 d7 1b 8e Oct 12 13:34:18: | bytes: 0d e1 59 af 0b fb a8 9b 93 5e 07 c5 b3 3b e3 1d Oct 12 13:34:18: | bytes: 68 ba 00 8c 55 ef e2 94 1f 17 a9 8b ed f7 dc 0b Oct 12 13:34:18: | bytes: 04 13 0e 61 e2 a1 5e 70 02 4c c9 e2 33 b1 3f c7 Oct 12 13:34:18: | bytes: 0b 22 3e 8a 76 b5 68 6e a2 cd a5 5b 54 bb 2a 57 Oct 12 13:34:18: | bytes: 5c 29 5f c0 6c e7 c3 1f 4d 02 01 47 14 7b 09 a1 Oct 12 13:34:18: | bytes: 7d 77 01 90 d1 e6 4c 83 62 59 2d 82 d6 90 42 7d Oct 12 13:34:18: | bytes: d3 44 2d 05 a7 88 85 51 17 75 a5 14 8d 7a c6 52 Oct 12 13:34:18: | bytes: c4 87 f6 ff f1 ec c9 ad 1a 7b 97 1c f1 95 eb 3b Oct 12 13:34:18: | bytes: 41 df c9 52 f8 9a 09 86 ce 85 1a e1 94 9c 9d 20 Oct 12 13:34:18: | bytes: 6b 84 08 5a 5b 78 34 15 e9 17 b9 10 77 f6 db 6c Oct 12 13:34:18: | bytes: b1 13 bd 75 fc 24 f1 85 46 2b 78 96 1c 08 7a 15 Oct 12 13:34:18: | bytes: 58 19 60 38 85 ea f5 ac 9e fd 34 82 60 a9 c0 2c Oct 12 13:34:18: | bytes: b1 e7 e2 80 5b 5d 50 ec 11 f0 e2 0a 04 d3 ca f1 Oct 12 13:34:18: | bytes: aa cf c4 78 29 50 68 c8 e2 56 ed 4f ab f1 c1 ec Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(420) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hmac prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c10006f70) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(420) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c10006f70 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10010470) bytes(0x7ffdf8372060/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c1000ea90) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1000ea90) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10011d00) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c1000ea90 Oct 12 13:34:18: | prf key: free key 0x7f5c10010470 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c10011d00) to bytes Oct 12 13:34:18: | symkey: key(0x7f5c10011d00) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash 6f e6 31 0e ba 51 93 42 cb e2 54 19 c0 54 c5 4d Oct 12 13:34:18: | prf outer hash bb 18 09 88 Oct 12 13:34:18: | prf outer: free key 0x7f5c10011d00 Oct 12 13:34:18: | prf final bytes 6f e6 31 0e ba 51 93 42 cb e2 54 19 c0 54 c5 4d Oct 12 13:34:18: | prf final bytes bb 18 09 88 Oct 12 13:34:18: | HASH(2) computed: Oct 12 13:34:18: | 6f e6 31 0e ba 51 93 42 cb e2 54 19 c0 54 c5 4d Oct 12 13:34:18: | bb 18 09 88 Oct 12 13:34:18: | compute_proto_keymat:needed_len (after ESP enc)=16 Oct 12 13:34:18: | compute_proto_keymat:needed_len (after ESP auth)=36 Oct 12 13:34:18: | hmac prf: init 0x7f5c1bd2bdd0 Oct 12 13:34:18: | hmac prf: init symkey symkey 0x7f5c1000a220 (length 20) Oct 12 13:34:18: | hmac prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000a220) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000a220) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10011d00) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10011d00) bytes(0x7ffdf8372050/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10011d00) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10010470) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | hmac prf: init 0x7f5c1bd2cd20 Oct 12 13:34:18: | hmac prf: init symkey symkey 0x7f5c1000a220 (length 20) Oct 12 13:34:18: | hmac prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000a220) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000a220) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1000ea90) bytes(0x7ffdf8372050/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | hmac prf: update symkey g^xy 0x7f5c10013530 (length 256) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10010470) symkey(2: 0x7f5c10013530) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10010470) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c10013530) length(256) type/mechanism(CONCATENATE_DATA_AND_BASE 0x00000363) Oct 12 13:34:18: | concat: key(0x7f5c1bd30ba0) length(320) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10010470 Oct 12 13:34:18: | hmac prf: update symkey g^xy 0x7f5c10013530 (length 256) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c10013530) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c10013530) length(256) type/mechanism(CONCATENATE_DATA_AND_BASE 0x00000363) Oct 12 13:34:18: | concat: key(0x7f5c10010470) length(320) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | hmac prf: update bytes data 0x7ffdf837212c (length 1) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd30ba0) bytes(0x7ffdf837212c/1) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd30ba0) length(320) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 03 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(321) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd30ba0 Oct 12 13:34:18: | hmac prf: update bytes data 0x7ffdf837212c (length 1) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10010470) bytes(0x7ffdf837212c/1) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(320) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 03 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd30ba0) length(321) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10010470 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2d3e8 (length 4) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10006f70) bytes(0x7f5c1bd2d3e8/4) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(321) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 10 73 0d 1b Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10010470) length(325) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10006f70 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2d3d0 (length 4) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd30ba0) bytes(0x7f5c1bd2d3d0/4) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd30ba0) length(321) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 4b 90 77 58 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(325) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd30ba0 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2a7f0 (length 16) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10010470) bytes(0x7f5c1bd2a7f0/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(325) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: e0 8f c7 d5 13 74 c6 a5 e5 9a 6f 2b fc d1 22 b2 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd30ba0) length(341) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10010470 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2a7f0 (length 16) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10006f70) bytes(0x7f5c1bd2a7f0/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(325) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: e0 8f c7 d5 13 74 c6 a5 e5 9a 6f 2b fc d1 22 b2 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10010470) length(341) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10006f70 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2a810 (length 16) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd30ba0) bytes(0x7f5c1bd2a810/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd30ba0) length(341) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 24 da 47 92 d7 34 9b 94 85 36 ee 5d 8c af 2c 73 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10006f70) length(357) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd30ba0 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2a810 (length 16) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10010470) bytes(0x7f5c1bd2a810/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(341) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 24 da 47 92 d7 34 9b 94 85 36 ee 5d 8c af 2c 73 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd30ba0) length(357) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10010470 Oct 12 13:34:18: | hmac prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c10006f70) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(357) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c10010470) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c10006f70 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10011d00) bytes(0x7ffdf8372030/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10011d00) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10006f70) symkey(2: 0x7f5c10010470) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10006f70) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c10010470) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c1bd32370) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c10010470 Oct 12 13:34:18: | prf key: free key 0x7f5c10011d00 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c1bd32370) to bytes Oct 12 13:34:18: | symkey: key(0x7f5c1bd32370) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash 52 a8 ba 64 a3 f4 7d 9d df d7 8a a3 3c c9 35 1d Oct 12 13:34:18: | prf outer hash d2 90 68 a6 Oct 12 13:34:18: | prf outer: free key 0x7f5c1bd32370 Oct 12 13:34:18: | prf final bytes 52 a8 ba 64 a3 f4 7d 9d df d7 8a a3 3c c9 35 1d Oct 12 13:34:18: | prf final bytes d2 90 68 a6 Oct 12 13:34:18: | hmac prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c1bd30ba0) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd30ba0) length(357) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c1bd32370) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c1bd30ba0 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1000ea90) bytes(0x7ffdf8372030/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c1bd30ba0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c1bd30ba0) symkey(2: 0x7f5c1bd32370) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c1bd30ba0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c1bd32370) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10011d00) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c1bd30ba0 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c1bd32370 Oct 12 13:34:18: | prf key: free key 0x7f5c1000ea90 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c10011d00) to bytes Oct 12 13:34:18: | symkey: key(0x7f5c10011d00) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash f0 70 61 88 95 2a ee 40 d1 77 ea 28 74 c8 cc fb Oct 12 13:34:18: | prf outer hash e4 7b 93 40 Oct 12 13:34:18: | prf outer: free key 0x7f5c10011d00 Oct 12 13:34:18: | prf final bytes f0 70 61 88 95 2a ee 40 d1 77 ea 28 74 c8 cc fb Oct 12 13:34:18: | prf final bytes e4 7b 93 40 Oct 12 13:34:18: | hmac prf: init 0x7f5c1bd2cd20 Oct 12 13:34:18: | hmac prf: init symkey symkey 0x7f5c1000a220 (length 20) Oct 12 13:34:18: | hmac prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000a220) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000a220) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10011d00) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10011d00) bytes(0x7ffdf8372050/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10011d00) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c1000ea90) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | hmac prf: init 0x7f5c1bd2bdd0 Oct 12 13:34:18: | hmac prf: init symkey symkey 0x7f5c1000a220 (length 20) Oct 12 13:34:18: | hmac prf: update Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000a220) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000a220) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd32370) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1bd32370) bytes(0x7ffdf8372050/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1bd32370) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c1bd30ba0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2bfb0 (length 20) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1bd2bfb0/20) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | bytes: 52 a8 ba 64 a3 f4 7d 9d df d7 8a a3 3c c9 35 1d Oct 12 13:34:18: | bytes: d2 90 68 a6 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10010470) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd30b70 (length 20) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd30ba0) bytes(0x7f5c1bd30b70/20) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd30ba0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | bytes: f0 70 61 88 95 2a ee 40 d1 77 ea 28 74 c8 cc fb Oct 12 13:34:18: | bytes: e4 7b 93 40 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd30ba0 Oct 12 13:34:18: | hmac prf: update symkey g^xy 0x7f5c10013530 (length 256) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c10010470) symkey(2: 0x7f5c10013530) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c10010470) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | symkey 2: key(0x7f5c10013530) length(256) type/mechanism(CONCATENATE_DATA_AND_BASE 0x00000363) Oct 12 13:34:18: | concat: key(0x7f5c1bd30ba0) length(340) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c10010470 Oct 12 13:34:18: | hmac prf: update symkey g^xy 0x7f5c10013530 (length 256) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c1000ea90) symkey(2: 0x7f5c10013530) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c1000ea90) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | symkey 2: key(0x7f5c10013530) length(256) type/mechanism(CONCATENATE_DATA_AND_BASE 0x00000363) Oct 12 13:34:18: | concat: key(0x7f5c10010470) length(340) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hmac prf: update bytes data 0x7ffdf837212c (length 1) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd30ba0) bytes(0x7ffdf837212c/1) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd30ba0) length(340) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 03 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(341) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd30ba0 Oct 12 13:34:18: | hmac prf: update bytes data 0x7ffdf837212c (length 1) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10010470) bytes(0x7ffdf837212c/1) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(340) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 03 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd30ba0) length(341) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10010470 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2d3e8 (length 4) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1bd2d3e8/4) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(341) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 10 73 0d 1b Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10010470) length(345) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2d3d0 (length 4) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd30ba0) bytes(0x7f5c1bd2d3d0/4) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd30ba0) length(341) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 4b 90 77 58 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(345) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd30ba0 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2a7f0 (length 16) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10010470) bytes(0x7f5c1bd2a7f0/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(345) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: e0 8f c7 d5 13 74 c6 a5 e5 9a 6f 2b fc d1 22 b2 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd30ba0) length(361) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10010470 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2a7f0 (length 16) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1000ea90) bytes(0x7f5c1bd2a7f0/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(345) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: e0 8f c7 d5 13 74 c6 a5 e5 9a 6f 2b fc d1 22 b2 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c10010470) length(361) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1000ea90 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2a810 (length 16) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c1bd30ba0) bytes(0x7f5c1bd2a810/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd30ba0) length(361) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 24 da 47 92 d7 34 9b 94 85 36 ee 5d 8c af 2c 73 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1000ea90) length(377) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c1bd30ba0 Oct 12 13:34:18: | hmac prf: update bytes data 0x7f5c1bd2a810 (length 16) Oct 12 13:34:18: | concat_symkey_bytes merge symkey(0x7f5c10010470) bytes(0x7f5c1bd2a810/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c10010470) length(361) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 24 da 47 92 d7 34 9b 94 85 36 ee 5d 8c af 2c 73 Oct 12 13:34:18: | concat_symkey_bytes key(0x7f5c1bd30ba0) length(377) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_bytes: free key 0x7f5c10010470 Oct 12 13:34:18: | hmac prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c1000ea90) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1000ea90) length(377) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c10010470) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c1000ea90 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c10011d00) bytes(0x7ffdf8372030/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c10011d00) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c1000ea90) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c1000ea90) symkey(2: 0x7f5c10010470) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c1000ea90) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c10010470) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10006f70) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c1000ea90 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c10010470 Oct 12 13:34:18: | prf key: free key 0x7f5c10011d00 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c10006f70) to bytes Oct 12 13:34:18: | symkey: key(0x7f5c10006f70) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash bb 90 3b 27 c7 bf 98 aa cf ea 11 ea c2 4e b4 f4 Oct 12 13:34:18: | prf outer hash 41 e4 92 fa Oct 12 13:34:18: | prf outer: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf final bytes bb 90 3b 27 c7 bf 98 aa cf ea 11 ea c2 4e b4 f4 Oct 12 13:34:18: | prf final bytes 41 e4 92 fa Oct 12 13:34:18: | hmac prf: final Oct 12 13:34:18: | prf inner hash: hash(oakley_sha) symkey(0x7f5c1bd30ba0) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey: key(0x7f5c1bd30ba0) length(377) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf inner hash: key(0x7f5c10006f70) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | prf inner:: free key 0x7f5c1bd30ba0 Oct 12 13:34:18: | xor_symkey_chunk merge symkey(0x7f5c1bd32370) bytes(0x7ffdf8372030/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:18: | symkey: key(0x7f5c1bd32370) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:18: | xor_symkey_chunk key(0x7f5c1bd30ba0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | concat: merge symkey(1: 0x7f5c1bd30ba0) symkey(2: 0x7f5c10006f70) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:18: | symkey 1: key(0x7f5c1bd30ba0) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:18: | symkey 2: key(0x7f5c10006f70) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:18: | concat: key(0x7f5c10011d00) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | append_symkey_symkey: free key 0x7f5c1bd30ba0 Oct 12 13:34:18: | prf hashed inner:: free key 0x7f5c10006f70 Oct 12 13:34:18: | prf key: free key 0x7f5c1bd32370 Oct 12 13:34:18: | prf outer hash hash(oakley_sha) symkey(0x7f5c10011d00) to bytes Oct 12 13:34:18: | symkey: key(0x7f5c10011d00) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:18: | prf outer hash be 96 d9 4b 4d 33 48 30 ab d7 70 ca 45 03 1c f8 Oct 12 13:34:18: | prf outer hash f6 4c 3d 31 Oct 12 13:34:18: | prf outer: free key 0x7f5c10011d00 Oct 12 13:34:18: | prf final bytes be 96 d9 4b 4d 33 48 30 ab d7 70 ca 45 03 1c f8 Oct 12 13:34:18: | prf final bytes f6 4c 3d 31 Oct 12 13:34:18: | ESP KEYMAT Oct 12 13:34:18: | KEYMAT computed: 52 a8 ba 64 a3 f4 7d 9d df d7 8a a3 3c c9 35 1d Oct 12 13:34:18: | KEYMAT computed: d2 90 68 a6 bb 90 3b 27 c7 bf 98 aa cf ea 11 ea Oct 12 13:34:18: | KEYMAT computed: c2 4e b4 f4 Oct 12 13:34:18: | Peer KEYMAT computed: Oct 12 13:34:18: | f0 70 61 88 95 2a ee 40 d1 77 ea 28 74 c8 cc fb Oct 12 13:34:18: | e4 7b 93 40 be 96 d9 4b 4d 33 48 30 ab d7 70 ca Oct 12 13:34:18: | 45 03 1c f8 Oct 12 13:34:18: | install_inbound_ipsec_sa() checking if we can route Oct 12 13:34:18: | route owner of "mytunnel" unrouted: NULL; eroute owner: NULL Oct 12 13:34:18: | could_route called for mytunnel (kind=CK_PERMANENT) Oct 12 13:34:18: | routing is easy, or has resolvable near-conflict Oct 12 13:34:18: | checking if this is a replacement state Oct 12 13:34:18: | st=0x7f5c1bd2d200 ost=(nil) st->serialno=#2 ost->serialno=#0 Oct 12 13:34:18: | installing outgoing SA now as refhim=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0x7ffdf8370788 pfkey_ext=0p0x7ffdf8370810 *pfkey_ext=0p(nil). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0x7ffdf8370788 pfkey_ext=0p0x7ffdf8370810 *pfkey_ext=0p0x7f5c1bd2a1a0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_build: spi=00001000 replay=0 sa_state=1 auth=0 encrypt=0 flags=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:70]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:60]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[0] needs 16 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[1] needs 24 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[5] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[6] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x7f5c1bd328a0 allocated 120 bytes, &(extensions[0])=0p0x7ffdf8370810 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[5] (type=5) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[6] (type=6) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=9(IPIP), len=15, res=0, seq=5, pid=2077. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 3(add). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=13 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=13. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=13 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7f5c1bd328b0 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=00001000 replay=0 state=1 auth=0 encrypt=0 flags=0 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=10. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=10 ext_type=5(source-address) ext_len=5 parsing ext 0p0x7f5c1bd328c8 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=5 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7f5c1bd328f0 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:34:18: | finish_pfkey_msg: K_SADB_ADD message 5 for Add SA tun:1000@2001:470:dc8c:1000::28:60 Oct 12 13:34:18: | 02 03 00 09 0f 00 00 00 05 00 00 00 1d 08 00 00 Oct 12 13:34:18: | 03 00 01 00 00 00 10 00 00 01 00 00 00 00 00 00 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 05 00 05 00 00 00 00 00 Oct 12 13:34:18: | 0a 00 00 00 00 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:34:18: | 00 00 00 00 00 28 00 70 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 05 00 06 00 00 00 00 00 0a 00 00 00 00 00 00 00 Oct 12 13:34:18: | 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 60 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | pfkey_get: K_SADB_ADD message 5 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 0 (16) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 1 (24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 5 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 6 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=9(IPIP), len=17, res=0, seq=5, pid=2077. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 3(add). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=15 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=15. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=15 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7ffdf8370a40 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=00001000 replay=0 state=1 auth=0 encrypt=0 flags=0 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=12. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=12 ext_type=5(source-address) ext_len=5 parsing ext 0p0x7ffdf8370a58 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=7. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=7 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7ffdf8370a80 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=32(X-saref) remain=2. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=2 ext_type=32(X-saref) ext_len=2 parsing ext 0p0x7ffdf8370aa8 with parser pfkey_x_ext_saref_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_x_saref_parse: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 32(X-saref) parsed. Oct 12 13:34:18: | added tunnel with ref=0 Oct 12 13:34:18: | recorded ref=0 as refhim Oct 12 13:34:18: | looking for alg with transid: 12 keylen: 128 auth: 2 Oct 12 13:34:18: | checking transid: 11 keylen: 0 auth: 1 Oct 12 13:34:18: | checking transid: 11 keylen: 0 auth: 2 Oct 12 13:34:18: | checking transid: 3 keylen: 24 auth: 0 Oct 12 13:34:18: | checking transid: 3 keylen: 24 auth: 1 Oct 12 13:34:18: | checking transid: 3 keylen: 24 auth: 2 Oct 12 13:34:18: | checking transid: 12 keylen: 16 auth: 0 Oct 12 13:34:18: | checking transid: 12 keylen: 16 auth: 1 Oct 12 13:34:18: | checking transid: 12 keylen: 16 auth: 2 Oct 12 13:34:18: | st->st_esp.keymat_len=36 is key_len=16 + ei->authkeylen=20 Oct 12 13:34:18: | ESP enckey: f0 70 61 88 95 2a ee 40 d1 77 ea 28 74 c8 cc fb Oct 12 13:34:18: | ESP authkey: e4 7b 93 40 be 96 d9 4b 4d 33 48 30 ab d7 70 ca Oct 12 13:34:18: | ESP authkey: 45 03 1c f8 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0x7ffdf8370788 pfkey_ext=0p0x7ffdf8370810 *pfkey_ext=0p(nil). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0x7ffdf8370788 pfkey_ext=0p0x7ffdf8370810 *pfkey_ext=0p0x7f5c1bd2be10. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_build: spi=4b907758 replay=64 sa_state=1 auth=3 encrypt=12 flags=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:70]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:60]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_key_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_key_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[0] needs 16 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[1] needs 24 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[5] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[6] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[8] needs 32 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[9] needs 24 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x7f5c1bd32950 allocated 176 bytes, &(extensions[0])=0p0x7ffdf8370810 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[5] (type=5) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[6] (type=6) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 32 bytes from extensions[8] (type=8) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[9] (type=9) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=3(ESP), len=22, res=0, seq=6, pid=2077. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 3(add). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=20 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=20. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=20 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7f5c1bd32960 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=4b907758 replay=64 state=1 auth=3 encrypt=12 flags=0 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=17. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=17 ext_type=5(source-address) ext_len=5 parsing ext 0p0x7f5c1bd32978 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=12. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=12 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7f5c1bd329a0 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=8(authentication-key) remain=7. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=7 ext_type=8(authentication-key) ext_len=4 parsing ext 0p0x7f5c1bd329c8 with parser pfkey_key_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_key_parse: success, found len=4 exttype=8(authentication-key) bits=160 reserved=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 8(authentication-key) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=9(cipher-key) remain=3. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=9(cipher-key) ext_len=3 parsing ext 0p0x7f5c1bd329e8 with parser pfkey_key_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_key_parse: success, found len=3 exttype=9(cipher-key) bits=128 reserved=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 9(cipher-key) parsed. Oct 12 13:34:18: | finish_pfkey_msg: K_SADB_ADD message 6 for Add SA esp:4b907758@2001:470:dc8c:1000::28:60 Oct 12 13:34:18: | 02 03 00 03 16 00 00 00 06 00 00 00 1d 08 00 00 Oct 12 13:34:18: | 03 00 01 00 4b 90 77 58 40 01 03 0c 00 00 00 00 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 05 00 05 00 00 00 00 00 Oct 12 13:34:18: | 0a 00 00 00 00 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:34:18: | 00 00 00 00 00 28 00 70 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 05 00 06 00 00 00 00 00 0a 00 00 00 00 00 00 00 Oct 12 13:34:18: | 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 60 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 04 00 08 00 a0 00 00 00 Oct 12 13:34:18: | e4 7b 93 40 be 96 d9 4b 4d 33 48 30 ab d7 70 ca Oct 12 13:34:18: | 45 03 1c f8 00 00 00 00 03 00 09 00 80 00 00 00 Oct 12 13:34:18: | f0 70 61 88 95 2a ee 40 d1 77 ea 28 74 c8 cc fb Oct 12 13:34:18: | pfkey_get: K_SADB_ADD message 6 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 0 (16) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 1 (24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 5 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 6 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 8 (32) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 9 (24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=3(ESP), len=17, res=0, seq=6, pid=2077. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 3(add). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=15 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=15. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=15 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7ffdf8370a40 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=4b907758 replay=64 state=1 auth=3 encrypt=12 flags=0 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=12. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=12 ext_type=5(source-address) ext_len=5 parsing ext 0p0x7ffdf8370a58 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=7. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=7 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7ffdf8370a80 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=32(X-saref) remain=2. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=2 ext_type=32(X-saref) ext_len=2 parsing ext 0p0x7ffdf8370aa8 with parser pfkey_x_ext_saref_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_x_saref_parse: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 32(X-saref) parsed. Oct 12 13:34:18: | grouping tun:1000@2001:470:dc8c:1000::28:60 (ref=0) and esp:4b907758@2001:470:dc8c:1000::28:60 (ref=0) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0x7ffdf8371898 pfkey_ext=0p0x7ffdf8371920 *pfkey_ext=0p(nil). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0x7ffdf8371898 pfkey_ext=0p0x7ffdf8371920 *pfkey_ext=0p0x7f5c1bd30a10. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_build: spi=00001000 replay=0 sa_state=0 auth=0 encrypt=0 flags=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:60]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_x_satype_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_build: spi=4b907758 replay=0 sa_state=0 auth=0 encrypt=0 flags=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=20 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:60]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[0] needs 16 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[1] needs 24 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[6] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[18] needs 8 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[19] needs 24 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[20] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x7f5c1bd32970 allocated 152 bytes, &(extensions[0])=0p0x7ffdf8371920 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[6] (type=6) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 8 bytes from extensions[18] (type=18) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[19] (type=19) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[20] (type=20) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=13(x-groupsa), errno=0, satype=9(IPIP), len=19, res=0, seq=7, pid=2077. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 13(x-groupsa). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=17 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=17. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=17 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7f5c1bd32980 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=00001000 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=14. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=14 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7f5c1bd32998 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=18(X-satype2) remain=9. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=9 ext_type=18(X-satype2) ext_len=1 parsing ext 0p0x7f5c1bd329c0 with parser pfkey_x_satype_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_x_satype_parse: enter Oct 12 13:34:18: | pfkey_lib_debug:pfkey_x_satype_parse: len=1 ext=18(X-satype2) satype=3(ESP) res=0,0,0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 18(X-satype2) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=19(X-security-association) remain=8. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=8 ext_type=19(X-security-association) ext_len=3 parsing ext 0p0x7f5c1bd329c8 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=19(X-security-association) spi=4b907758 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 19(X-security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=20(X-destination-address2) remain=5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=5 ext_type=20(X-destination-address2) ext_len=5 parsing ext 0p0x7f5c1bd329e0 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=20(X-destination-address2) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 20(X-destination-address2) parsed. Oct 12 13:34:18: | finish_pfkey_msg: K_SADB_X_GRPSA message 7 for group tun:1000@2001:470:dc8c:1000::28:60 Oct 12 13:34:18: | 02 0d 00 09 13 00 00 00 07 00 00 00 1d 08 00 00 Oct 12 13:34:18: | 03 00 01 00 00 00 10 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 05 00 06 00 00 00 00 00 Oct 12 13:34:18: | 0a 00 00 00 00 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:34:18: | 00 00 00 00 00 28 00 60 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 01 00 12 00 03 00 00 00 03 00 13 00 4b 90 77 58 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 05 00 14 00 00 00 00 00 0a 00 00 00 00 00 00 00 Oct 12 13:34:18: | 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 60 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | pfkey_get: K_SADB_X_GRPSA message 7 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 0 (16) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 1 (24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 6 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 18 (8) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 19 (24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 20 (40) Oct 12 13:34:18: | outgoing SA has refhim=4294901761 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0x7ffdf8370788 pfkey_ext=0p0x7ffdf8370810 *pfkey_ext=0p(nil). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0x7ffdf8370788 pfkey_ext=0p0x7ffdf8370810 *pfkey_ext=0p0x7f5c1bd32950. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_build: spi=00001001 replay=0 sa_state=1 auth=0 encrypt=0 flags=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:60]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:70]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[0] needs 16 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[1] needs 24 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[5] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[6] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x7f5c1bd328a0 allocated 120 bytes, &(extensions[0])=0p0x7ffdf8370810 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[5] (type=5) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[6] (type=6) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=9(IPIP), len=15, res=0, seq=8, pid=2077. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 3(add). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=13 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=13. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=13 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7f5c1bd328b0 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=00001001 replay=0 state=1 auth=0 encrypt=0 flags=0 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=10. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=10 ext_type=5(source-address) ext_len=5 parsing ext 0p0x7f5c1bd328c8 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=5 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7f5c1bd328f0 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:34:18: | finish_pfkey_msg: K_SADB_ADD message 8 for Add SA tun:1001@2001:470:dc8c:1000::28:60 Oct 12 13:34:18: | 02 03 00 09 0f 00 00 00 08 00 00 00 1d 08 00 00 Oct 12 13:34:18: | 03 00 01 00 00 00 10 01 00 01 00 00 00 00 00 00 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 05 00 05 00 00 00 00 00 Oct 12 13:34:18: | 0a 00 00 00 00 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:34:18: | 00 00 00 00 00 28 00 60 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 05 00 06 00 00 00 00 00 0a 00 00 00 00 00 00 00 Oct 12 13:34:18: | 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 70 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | pfkey_get: K_SADB_ADD message 8 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 0 (16) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 1 (24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 5 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 6 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=9(IPIP), len=17, res=0, seq=8, pid=2077. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 3(add). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=15 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=15. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=15 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7ffdf8370a40 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=00001001 replay=0 state=1 auth=0 encrypt=0 flags=1 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=12. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=12 ext_type=5(source-address) ext_len=5 parsing ext 0p0x7ffdf8370a58 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=7. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=7 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7ffdf8370a80 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=32(X-saref) remain=2. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=2 ext_type=32(X-saref) ext_len=2 parsing ext 0p0x7ffdf8370aa8 with parser pfkey_x_ext_saref_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_x_saref_parse: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 32(X-saref) parsed. Oct 12 13:34:18: | added tunnel with ref=0 Oct 12 13:34:18: | looking for alg with transid: 12 keylen: 128 auth: 2 Oct 12 13:34:18: | checking transid: 11 keylen: 0 auth: 1 Oct 12 13:34:18: | checking transid: 11 keylen: 0 auth: 2 Oct 12 13:34:18: | checking transid: 3 keylen: 24 auth: 0 Oct 12 13:34:18: | checking transid: 3 keylen: 24 auth: 1 Oct 12 13:34:18: | checking transid: 3 keylen: 24 auth: 2 Oct 12 13:34:18: | checking transid: 12 keylen: 16 auth: 0 Oct 12 13:34:18: | checking transid: 12 keylen: 16 auth: 1 Oct 12 13:34:18: | checking transid: 12 keylen: 16 auth: 2 Oct 12 13:34:18: | st->st_esp.keymat_len=36 is key_len=16 + ei->authkeylen=20 Oct 12 13:34:18: | ESP enckey: 52 a8 ba 64 a3 f4 7d 9d df d7 8a a3 3c c9 35 1d Oct 12 13:34:18: | ESP authkey: d2 90 68 a6 bb 90 3b 27 c7 bf 98 aa cf ea 11 ea Oct 12 13:34:18: | ESP authkey: c2 4e b4 f4 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0x7ffdf8370788 pfkey_ext=0p0x7ffdf8370810 *pfkey_ext=0p(nil). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0x7ffdf8370788 pfkey_ext=0p0x7ffdf8370810 *pfkey_ext=0p0x7f5c1bd2be10. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_build: spi=10730d1b replay=64 sa_state=1 auth=3 encrypt=12 flags=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:60]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:70]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_key_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_key_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[0] needs 16 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[1] needs 24 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[5] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[6] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[8] needs 32 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[9] needs 24 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x7f5c1bd32970 allocated 176 bytes, &(extensions[0])=0p0x7ffdf8370810 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[5] (type=5) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[6] (type=6) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 32 bytes from extensions[8] (type=8) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[9] (type=9) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=3(ESP), len=22, res=0, seq=9, pid=2077. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 3(add). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=20 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=20. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=20 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7f5c1bd32980 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=10730d1b replay=64 state=1 auth=3 encrypt=12 flags=0 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=17. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=17 ext_type=5(source-address) ext_len=5 parsing ext 0p0x7f5c1bd32998 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=12. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=12 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7f5c1bd329c0 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=8(authentication-key) remain=7. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=7 ext_type=8(authentication-key) ext_len=4 parsing ext 0p0x7f5c1bd329e8 with parser pfkey_key_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_key_parse: success, found len=4 exttype=8(authentication-key) bits=160 reserved=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 8(authentication-key) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=9(cipher-key) remain=3. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=9(cipher-key) ext_len=3 parsing ext 0p0x7f5c1bd32a08 with parser pfkey_key_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_key_parse: success, found len=3 exttype=9(cipher-key) bits=128 reserved=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 9(cipher-key) parsed. Oct 12 13:34:18: | finish_pfkey_msg: K_SADB_ADD message 9 for Add SA esp:10730d1b@2001:470:dc8c:1000::28:70 Oct 12 13:34:18: | 02 03 00 03 16 00 00 00 09 00 00 00 1d 08 00 00 Oct 12 13:34:18: | 03 00 01 00 10 73 0d 1b 40 01 03 0c 00 00 00 00 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 05 00 05 00 00 00 00 00 Oct 12 13:34:18: | 0a 00 00 00 00 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:34:18: | 00 00 00 00 00 28 00 60 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 05 00 06 00 00 00 00 00 0a 00 00 00 00 00 00 00 Oct 12 13:34:18: | 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 70 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 04 00 08 00 a0 00 00 00 Oct 12 13:34:18: | d2 90 68 a6 bb 90 3b 27 c7 bf 98 aa cf ea 11 ea Oct 12 13:34:18: | c2 4e b4 f4 00 00 00 00 03 00 09 00 80 00 00 00 Oct 12 13:34:18: | 52 a8 ba 64 a3 f4 7d 9d df d7 8a a3 3c c9 35 1d Oct 12 13:34:18: | pfkey_get: K_SADB_ADD message 9 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 0 (16) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 1 (24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 5 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 6 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 8 (32) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 9 (24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=3(ESP), len=17, res=0, seq=9, pid=2077. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 3(add). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=15 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=15. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=15 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7ffdf8370a40 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=10730d1b replay=64 state=1 auth=3 encrypt=12 flags=1 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=12. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=12 ext_type=5(source-address) ext_len=5 parsing ext 0p0x7ffdf8370a58 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=7. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=7 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7ffdf8370a80 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=32(X-saref) remain=2. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=2 ext_type=32(X-saref) ext_len=2 parsing ext 0p0x7ffdf8370aa8 with parser pfkey_x_ext_saref_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_x_saref_parse: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 32(X-saref) parsed. Oct 12 13:34:18: | add inbound eroute 2001:470:dc8c:1000::28:60/128:0 --0-> 2001:470:dc8c:1000::28:70/128:0 => tun:1001@2001:470:dc8c:1000::28:70 (raw_eroute) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0x7ffdf83715d8 pfkey_ext=0p0x7ffdf8371700 *pfkey_ext=0p(nil). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0x7ffdf83715d8 pfkey_ext=0p0x7ffdf8371700 *pfkey_ext=0p0x7f5c1bd2a1a0. Oct 12 13:34:18: | useless SPI printing for cur(17825792) and new(17825792) spi Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_build: spi=00001001 replay=0 sa_state=0 auth=0 encrypt=0 flags=8 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:60]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:70]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=21 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:60]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=22 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:70]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=23 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=24 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[0] needs 16 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[1] needs 24 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[5] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[6] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[21] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[22] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[23] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[24] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x7f5c1bd32a00 allocated 280 bytes, &(extensions[0])=0p0x7ffdf8371700 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[5] (type=5) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[6] (type=6) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[21] (type=21) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[22] (type=22) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[23] (type=23) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[24] (type=24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=14(x-addflow(eroute)), errno=0, satype=9(IPIP), len=35, res=0, seq=10, pid=2077. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 14(x-addflow(eroute)). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=33 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=33. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=33 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7f5c1bd32a10 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=00001001 replay=0 state=0 auth=0 encrypt=0 flags=8 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=30. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=30 ext_type=5(source-address) ext_len=5 parsing ext 0p0x7f5c1bd32a28 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=25. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=25 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7f5c1bd32a50 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=21(X-source-flow-address) remain=20. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=20 ext_type=21(X-source-flow-address) ext_len=5 parsing ext 0p0x7f5c1bd32a78 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=21(X-source-flow-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 21(X-source-flow-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=22(X-dest-flow-address) remain=15. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=15 ext_type=22(X-dest-flow-address) ext_len=5 parsing ext 0p0x7f5c1bd32aa0 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=22(X-dest-flow-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 22(X-dest-flow-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=23(X-source-mask) remain=10. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=10 ext_type=23(X-source-mask) ext_len=5 parsing ext 0p0x7f5c1bd32ac8 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=23(X-source-mask) family=10(AF_INET6) address=ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 23(X-source-mask) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=24(X-dest-mask) remain=5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=5 ext_type=24(X-dest-mask) ext_len=5 parsing ext 0p0x7f5c1bd32af0 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=24(X-dest-mask) family=10(AF_INET6) address=ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 24(X-dest-mask) parsed. Oct 12 13:34:18: | finish_pfkey_msg: K_SADB_X_ADDFLOW message 10 for flow tun:1001@2001:470:dc8c:1000::28:70 Oct 12 13:34:18: | 02 0e 00 09 23 00 00 00 0a 00 00 00 1d 08 00 00 Oct 12 13:34:18: | 03 00 01 00 00 00 10 01 00 00 00 00 08 00 00 00 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 05 00 05 00 00 00 00 00 Oct 12 13:34:18: | 0a 00 00 00 00 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:34:18: | 00 00 00 00 00 28 00 60 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 05 00 06 00 00 00 00 00 0a 00 00 00 00 00 00 00 Oct 12 13:34:18: | 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 70 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 05 00 15 00 00 00 00 00 Oct 12 13:34:18: | 0a 00 00 00 00 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:34:18: | 00 00 00 00 00 28 00 60 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 05 00 16 00 00 00 00 00 0a 00 00 00 00 00 00 00 Oct 12 13:34:18: | 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 70 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 05 00 17 00 00 00 00 00 Oct 12 13:34:18: | 0a 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff Oct 12 13:34:18: | ff ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 05 00 18 00 00 00 00 00 0a 00 00 00 00 00 00 00 Oct 12 13:34:18: | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | pfkey_get: K_SADB_X_ADDFLOW message 10 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 0 (16) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 1 (24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 5 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 6 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 21 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 22 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 23 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 24 (40) Oct 12 13:34:18: | raw_eroute result=success Oct 12 13:34:18: | grouping tun:1001@2001:470:dc8c:1000::28:60 (ref=0) and esp:10730d1b@2001:470:dc8c:1000::28:70 (ref=0) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0x7ffdf8371898 pfkey_ext=0p0x7ffdf8371920 *pfkey_ext=0p(nil). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0x7ffdf8371898 pfkey_ext=0p0x7ffdf8371920 *pfkey_ext=0p0x7f5c1bd32950. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_build: spi=00001001 replay=0 sa_state=0 auth=0 encrypt=0 flags=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:70]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_x_satype_build: Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_build: spi=10730d1b replay=0 sa_state=0 auth=0 encrypt=0 flags=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: exttype=20 proto=0 prefixlen=0 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:70]:0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[0] needs 16 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[1] needs 24 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[6] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[18] needs 8 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[19] needs 24 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: extensions[20] needs 40 bytes Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x7f5c1bd32a00 allocated 152 bytes, &(extensions[0])=0p0x7ffdf8371920 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[6] (type=6) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 8 bytes from extensions[18] (type=18) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[19] (type=19) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[20] (type=20) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=13(x-groupsa), errno=0, satype=9(IPIP), len=19, res=0, seq=11, pid=2077. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 13(x-groupsa). Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=17 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=17. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=17 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7f5c1bd32a10 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=00001001 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=14. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=14 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7f5c1bd32a28 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=18(X-satype2) remain=9. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=9 ext_type=18(X-satype2) ext_len=1 parsing ext 0p0x7f5c1bd32a50 with parser pfkey_x_satype_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_x_satype_parse: enter Oct 12 13:34:18: | pfkey_lib_debug:pfkey_x_satype_parse: len=1 ext=18(X-satype2) satype=3(ESP) res=0,0,0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 18(X-satype2) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=19(X-security-association) remain=8. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=8 ext_type=19(X-security-association) ext_len=3 parsing ext 0p0x7f5c1bd32a58 with parser pfkey_sa_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=19(X-security-association) spi=10730d1b replay=0 state=0 auth=0 encrypt=0 flags=0 ref=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 19(X-security-association) parsed. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=20(X-destination-address2) remain=5. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: remain=5 ext_type=20(X-destination-address2) ext_len=5 parsing ext 0p0x7f5c1bd32a70 with parser pfkey_address_parse. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: found exttype=20(X-destination-address2) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:34:18: | pfkey_lib_debug:pfkey_msg_parse: Extension 20(X-destination-address2) parsed. Oct 12 13:34:18: | finish_pfkey_msg: K_SADB_X_GRPSA message 11 for group tun:1001@2001:470:dc8c:1000::28:60 Oct 12 13:34:18: | 02 0d 00 09 13 00 00 00 0b 00 00 00 1d 08 00 00 Oct 12 13:34:18: | 03 00 01 00 00 00 10 01 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 05 00 06 00 00 00 00 00 Oct 12 13:34:18: | 0a 00 00 00 00 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:34:18: | 00 00 00 00 00 28 00 70 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 01 00 12 00 03 00 00 00 03 00 13 00 10 73 0d 1b Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | 05 00 14 00 00 00 00 00 0a 00 00 00 00 00 00 00 Oct 12 13:34:18: | 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 70 Oct 12 13:34:18: | 00 00 00 00 00 00 00 00 Oct 12 13:34:18: | pfkey_get: K_SADB_X_GRPSA message 11 Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 0 (16) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 1 (24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 6 (40) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 18 (8) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 19 (24) Oct 12 13:34:18: | pfkey_lib_debug:pfkey_extensions_free:Free extension 20 (40) Oct 12 13:34:18: | encrypting: 01 00 00 18 6f e6 31 0e ba 51 93 42 cb e2 54 19 Oct 12 13:34:18: | encrypting: c0 54 c5 4d bb 18 09 88 0a 00 00 38 00 00 00 01 Oct 12 13:34:18: | encrypting: 00 00 00 01 00 00 00 2c 00 03 04 01 10 73 0d 1b Oct 12 13:34:18: | encrypting: 00 00 00 20 00 0c 00 00 80 03 00 0e 80 04 00 01 Oct 12 13:34:18: | encrypting: 80 01 00 01 80 02 70 80 80 05 00 02 80 06 00 80 Oct 12 13:34:18: | encrypting: 04 00 00 14 24 da 47 92 d7 34 9b 94 85 36 ee 5d Oct 12 13:34:18: | encrypting: 8c af 2c 73 00 00 01 04 16 01 70 d4 ca e2 c8 bd Oct 12 13:34:18: | encrypting: 91 80 3a 08 7a b4 58 a8 6a 35 cc c5 2e c1 72 7d Oct 12 13:34:18: | encrypting: 0a ae 2d 1f b6 d7 1b 8e 0d e1 59 af 0b fb a8 9b Oct 12 13:34:18: | encrypting: 93 5e 07 c5 b3 3b e3 1d 68 ba 00 8c 55 ef e2 94 Oct 12 13:34:18: | encrypting: 1f 17 a9 8b ed f7 dc 0b 04 13 0e 61 e2 a1 5e 70 Oct 12 13:34:18: | encrypting: 02 4c c9 e2 33 b1 3f c7 0b 22 3e 8a 76 b5 68 6e Oct 12 13:34:18: | encrypting: a2 cd a5 5b 54 bb 2a 57 5c 29 5f c0 6c e7 c3 1f Oct 12 13:34:18: | encrypting: 4d 02 01 47 14 7b 09 a1 7d 77 01 90 d1 e6 4c 83 Oct 12 13:34:18: | encrypting: 62 59 2d 82 d6 90 42 7d d3 44 2d 05 a7 88 85 51 Oct 12 13:34:18: | encrypting: 17 75 a5 14 8d 7a c6 52 c4 87 f6 ff f1 ec c9 ad Oct 12 13:34:18: | encrypting: 1a 7b 97 1c f1 95 eb 3b 41 df c9 52 f8 9a 09 86 Oct 12 13:34:18: | encrypting: ce 85 1a e1 94 9c 9d 20 6b 84 08 5a 5b 78 34 15 Oct 12 13:34:18: | encrypting: e9 17 b9 10 77 f6 db 6c b1 13 bd 75 fc 24 f1 85 Oct 12 13:34:18: | encrypting: 46 2b 78 96 1c 08 7a 15 58 19 60 38 85 ea f5 ac Oct 12 13:34:18: | encrypting: 9e fd 34 82 60 a9 c0 2c b1 e7 e2 80 5b 5d 50 ec Oct 12 13:34:18: | encrypting: 11 f0 e2 0a 04 d3 ca f1 aa cf c4 78 29 50 68 c8 Oct 12 13:34:18: | encrypting: e2 56 ed 4f ab f1 c1 ec Oct 12 13:34:18: | IV: 7e 29 fc 21 7f c5 0f 75 02 84 6a dd 1e 61 23 85 Oct 12 13:34:18: | unpadded size is: 360 Oct 12 13:34:18: | emitting 8 zero bytes of encryption padding into ISAKMP Message Oct 12 13:34:18: | encrypting 368 using OAKLEY_AES_CBC Oct 12 13:34:18: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:34:18: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:34:18: | next IV: d3 e2 4e 08 79 31 5b f1 f3 05 cb ec 56 3d e9 15 Oct 12 13:34:18: | no IKEv1 message padding required Oct 12 13:34:18: | emitting length of ISAKMP Message: 396 Oct 12 13:34:18: | finished processing quick inI1 Oct 12 13:34:18: | complete v1 state transition with STF_OK Oct 12 13:34:18: "mytunnel" #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 Oct 12 13:34:18: | child state #2: STATE_QUICK_R0(authenticated-ipsec) > STATE_QUICK_R1(authenticated-ipsec) Oct 12 13:34:18: | ignore states: 0 Oct 12 13:34:18: | half-open-ike states: 0 Oct 12 13:34:18: | open-ike states: 0 Oct 12 13:34:18: | established-anonymous-ike states: 0 Oct 12 13:34:18: | established-authenticated-ike states: 1 Oct 12 13:34:18: | anonymous-ipsec states: 0 Oct 12 13:34:18: | authenticated-ipsec states: 1 Oct 12 13:34:18: | informational states: 0 Oct 12 13:34:18: | unknown states: 0 Oct 12 13:34:18: | category states: 2 count states: 2 Oct 12 13:34:18: | state: #2 requesting EVENT_CRYPTO_FAILED to be deleted Oct 12 13:34:18: | sending reply packet to 2001:470:dc8c:1000::28:60:500 (from port 500) Oct 12 13:34:18: | sending 396 bytes for STATE_QUICK_R0 through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #2) Oct 12 13:34:18: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:18: | 08 10 20 01 ee ed 7e 06 00 00 01 8c 55 9d 01 57 Oct 12 13:34:18: | 1d 41 e2 b2 cd 8c 69 a9 e3 bc 26 a3 cf 93 58 0c Oct 12 13:34:18: | cf 4e cf c4 03 97 39 0a 9f c9 24 ac 9e 55 55 f7 Oct 12 13:34:18: | 63 33 92 30 47 eb dd 8d 15 74 17 b1 8b c1 7e 43 Oct 12 13:34:18: | bf 51 e0 cf e8 b0 a8 01 b9 4f 6c 64 2d a2 51 df Oct 12 13:34:18: | c2 6e a5 f0 da 5b 97 a8 ec 4a 89 79 8c d8 4f 6b Oct 12 13:34:18: | 69 a6 0c ca ab 35 f2 c0 4d 6b 67 ff 27 90 f6 0a Oct 12 13:34:18: | 20 1b 96 5d 5e dc 47 cd 0a ad cd 08 34 b0 46 53 Oct 12 13:34:18: | 14 6e a8 63 5d 98 34 8f bc a8 55 c0 98 9b d8 14 Oct 12 13:34:18: | b5 45 67 47 df 8f 33 9e 46 bb fa 7a 17 a7 de 2a Oct 12 13:34:18: | 1c ea af 51 73 88 90 ab 32 69 71 93 3b 06 c9 9b Oct 12 13:34:18: | cc 69 d0 e8 ca e0 79 91 4e 3f e9 4d 1b b7 00 9b Oct 12 13:34:18: | 6f 73 48 db 34 ea fc dc 4a 72 ab cc 3c f9 89 1e Oct 12 13:34:18: | 59 e5 12 5d 15 28 e5 86 c5 e8 d4 7c 8e 5c 2a a5 Oct 12 13:34:18: | 89 4e 7d b0 d8 53 d9 1c 35 e9 a7 7f 53 ce a0 f6 Oct 12 13:34:18: | 99 3f cc ae 3c 77 4f 8e a6 7f 28 41 77 11 58 2c Oct 12 13:34:18: | e1 01 d8 7b 4d 7c 46 fa 10 fe 7e b7 05 eb 2d 4f Oct 12 13:34:18: | 13 eb 75 8a 52 8e c5 13 9a d7 53 c0 1c 0e 0e 2c Oct 12 13:34:18: | 32 a9 1a 91 ab 5b 5c df 0f 35 e8 bb 66 17 c2 2b Oct 12 13:34:18: | f2 7a 55 88 ff 77 d3 e4 70 27 41 fe a0 dc 88 5e Oct 12 13:34:18: | a7 b2 18 5f b6 2d 6f d7 07 77 e5 b4 cc c2 c7 92 Oct 12 13:34:18: | f6 6e 9d 72 6a 06 ef fc 46 5f e4 b0 e6 35 ab 1f Oct 12 13:34:18: | f3 18 25 80 1e c0 a5 b7 37 a2 45 3a d3 e2 4e 08 Oct 12 13:34:18: | 79 31 5b f1 f3 05 cb ec 56 3d e9 15 Oct 12 13:34:18: | event_schedule_ms called for about 500 ms Oct 12 13:34:18: | event_schedule_tv called for about 0 seconds and change Oct 12 13:34:18: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500000 seconds for #2 Oct 12 13:34:18: "mytunnel" #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 tunnel mode {ESP=>0x4b907758 <0x10730d1b xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=passive} Oct 12 13:34:18: | modecfg pull: noquirk policy:push not-client Oct 12 13:34:18: | phase 1 is done, looking for phase 2 to unpend Oct 12 13:34:19: | handling event EVENT_v1_RETRANSMIT for state #2 Oct 12 13:34:19: | processing connection "mytunnel" Oct 12 13:34:19: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #2 attempt 0 of 0 Oct 12 13:34:19: | sending 396 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #2) Oct 12 13:34:19: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:19: | 08 10 20 01 ee ed 7e 06 00 00 01 8c 55 9d 01 57 Oct 12 13:34:19: | 1d 41 e2 b2 cd 8c 69 a9 e3 bc 26 a3 cf 93 58 0c Oct 12 13:34:19: | cf 4e cf c4 03 97 39 0a 9f c9 24 ac 9e 55 55 f7 Oct 12 13:34:19: | 63 33 92 30 47 eb dd 8d 15 74 17 b1 8b c1 7e 43 Oct 12 13:34:19: | bf 51 e0 cf e8 b0 a8 01 b9 4f 6c 64 2d a2 51 df Oct 12 13:34:19: | c2 6e a5 f0 da 5b 97 a8 ec 4a 89 79 8c d8 4f 6b Oct 12 13:34:19: | 69 a6 0c ca ab 35 f2 c0 4d 6b 67 ff 27 90 f6 0a Oct 12 13:34:19: | 20 1b 96 5d 5e dc 47 cd 0a ad cd 08 34 b0 46 53 Oct 12 13:34:19: | 14 6e a8 63 5d 98 34 8f bc a8 55 c0 98 9b d8 14 Oct 12 13:34:19: | b5 45 67 47 df 8f 33 9e 46 bb fa 7a 17 a7 de 2a Oct 12 13:34:19: | 1c ea af 51 73 88 90 ab 32 69 71 93 3b 06 c9 9b Oct 12 13:34:19: | cc 69 d0 e8 ca e0 79 91 4e 3f e9 4d 1b b7 00 9b Oct 12 13:34:19: | 6f 73 48 db 34 ea fc dc 4a 72 ab cc 3c f9 89 1e Oct 12 13:34:19: | 59 e5 12 5d 15 28 e5 86 c5 e8 d4 7c 8e 5c 2a a5 Oct 12 13:34:19: | 89 4e 7d b0 d8 53 d9 1c 35 e9 a7 7f 53 ce a0 f6 Oct 12 13:34:19: | 99 3f cc ae 3c 77 4f 8e a6 7f 28 41 77 11 58 2c Oct 12 13:34:19: | e1 01 d8 7b 4d 7c 46 fa 10 fe 7e b7 05 eb 2d 4f Oct 12 13:34:19: | 13 eb 75 8a 52 8e c5 13 9a d7 53 c0 1c 0e 0e 2c Oct 12 13:34:19: | 32 a9 1a 91 ab 5b 5c df 0f 35 e8 bb 66 17 c2 2b Oct 12 13:34:19: | f2 7a 55 88 ff 77 d3 e4 70 27 41 fe a0 dc 88 5e Oct 12 13:34:19: | a7 b2 18 5f b6 2d 6f d7 07 77 e5 b4 cc c2 c7 92 Oct 12 13:34:19: | f6 6e 9d 72 6a 06 ef fc 46 5f e4 b0 e6 35 ab 1f Oct 12 13:34:19: | f3 18 25 80 1e c0 a5 b7 37 a2 45 3a d3 e2 4e 08 Oct 12 13:34:19: | 79 31 5b f1 f3 05 cb ec 56 3d e9 15 Oct 12 13:34:19: | event_schedule_ms called for about 500 ms Oct 12 13:34:19: | event_schedule_tv called for about 0 seconds and change Oct 12 13:34:19: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500000 seconds for #2 Oct 12 13:34:19: | handling event EVENT_v1_RETRANSMIT for state #2 Oct 12 13:34:19: | processing connection "mytunnel" Oct 12 13:34:19: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #2 attempt 0 of 0 Oct 12 13:34:19: | sending 396 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #2) Oct 12 13:34:19: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:19: | 08 10 20 01 ee ed 7e 06 00 00 01 8c 55 9d 01 57 Oct 12 13:34:19: | 1d 41 e2 b2 cd 8c 69 a9 e3 bc 26 a3 cf 93 58 0c Oct 12 13:34:19: | cf 4e cf c4 03 97 39 0a 9f c9 24 ac 9e 55 55 f7 Oct 12 13:34:19: | 63 33 92 30 47 eb dd 8d 15 74 17 b1 8b c1 7e 43 Oct 12 13:34:19: | bf 51 e0 cf e8 b0 a8 01 b9 4f 6c 64 2d a2 51 df Oct 12 13:34:19: | c2 6e a5 f0 da 5b 97 a8 ec 4a 89 79 8c d8 4f 6b Oct 12 13:34:19: | 69 a6 0c ca ab 35 f2 c0 4d 6b 67 ff 27 90 f6 0a Oct 12 13:34:19: | 20 1b 96 5d 5e dc 47 cd 0a ad cd 08 34 b0 46 53 Oct 12 13:34:19: | 14 6e a8 63 5d 98 34 8f bc a8 55 c0 98 9b d8 14 Oct 12 13:34:19: | b5 45 67 47 df 8f 33 9e 46 bb fa 7a 17 a7 de 2a Oct 12 13:34:19: | 1c ea af 51 73 88 90 ab 32 69 71 93 3b 06 c9 9b Oct 12 13:34:19: | cc 69 d0 e8 ca e0 79 91 4e 3f e9 4d 1b b7 00 9b Oct 12 13:34:19: | 6f 73 48 db 34 ea fc dc 4a 72 ab cc 3c f9 89 1e Oct 12 13:34:19: | 59 e5 12 5d 15 28 e5 86 c5 e8 d4 7c 8e 5c 2a a5 Oct 12 13:34:19: | 89 4e 7d b0 d8 53 d9 1c 35 e9 a7 7f 53 ce a0 f6 Oct 12 13:34:19: | 99 3f cc ae 3c 77 4f 8e a6 7f 28 41 77 11 58 2c Oct 12 13:34:19: | e1 01 d8 7b 4d 7c 46 fa 10 fe 7e b7 05 eb 2d 4f Oct 12 13:34:19: | 13 eb 75 8a 52 8e c5 13 9a d7 53 c0 1c 0e 0e 2c Oct 12 13:34:19: | 32 a9 1a 91 ab 5b 5c df 0f 35 e8 bb 66 17 c2 2b Oct 12 13:34:19: | f2 7a 55 88 ff 77 d3 e4 70 27 41 fe a0 dc 88 5e Oct 12 13:34:19: | a7 b2 18 5f b6 2d 6f d7 07 77 e5 b4 cc c2 c7 92 Oct 12 13:34:19: | f6 6e 9d 72 6a 06 ef fc 46 5f e4 b0 e6 35 ab 1f Oct 12 13:34:19: | f3 18 25 80 1e c0 a5 b7 37 a2 45 3a d3 e2 4e 08 Oct 12 13:34:19: | 79 31 5b f1 f3 05 cb ec 56 3d e9 15 Oct 12 13:34:19: | event_schedule_ms called for about 1000 ms Oct 12 13:34:19: | event_schedule_tv called for about 1 seconds and change Oct 12 13:34:19: | inserting event EVENT_v1_RETRANSMIT, timeout in 1.000000 seconds for #2 Oct 12 13:34:20: | handling event EVENT_v1_RETRANSMIT for state #2 Oct 12 13:34:20: | processing connection "mytunnel" Oct 12 13:34:20: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #2 attempt 0 of 0 Oct 12 13:34:20: | sending 396 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #2) Oct 12 13:34:20: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:20: | 08 10 20 01 ee ed 7e 06 00 00 01 8c 55 9d 01 57 Oct 12 13:34:20: | 1d 41 e2 b2 cd 8c 69 a9 e3 bc 26 a3 cf 93 58 0c Oct 12 13:34:20: | cf 4e cf c4 03 97 39 0a 9f c9 24 ac 9e 55 55 f7 Oct 12 13:34:20: | 63 33 92 30 47 eb dd 8d 15 74 17 b1 8b c1 7e 43 Oct 12 13:34:20: | bf 51 e0 cf e8 b0 a8 01 b9 4f 6c 64 2d a2 51 df Oct 12 13:34:20: | c2 6e a5 f0 da 5b 97 a8 ec 4a 89 79 8c d8 4f 6b Oct 12 13:34:20: | 69 a6 0c ca ab 35 f2 c0 4d 6b 67 ff 27 90 f6 0a Oct 12 13:34:20: | 20 1b 96 5d 5e dc 47 cd 0a ad cd 08 34 b0 46 53 Oct 12 13:34:20: | 14 6e a8 63 5d 98 34 8f bc a8 55 c0 98 9b d8 14 Oct 12 13:34:20: | b5 45 67 47 df 8f 33 9e 46 bb fa 7a 17 a7 de 2a Oct 12 13:34:20: | 1c ea af 51 73 88 90 ab 32 69 71 93 3b 06 c9 9b Oct 12 13:34:20: | cc 69 d0 e8 ca e0 79 91 4e 3f e9 4d 1b b7 00 9b Oct 12 13:34:20: | 6f 73 48 db 34 ea fc dc 4a 72 ab cc 3c f9 89 1e Oct 12 13:34:20: | 59 e5 12 5d 15 28 e5 86 c5 e8 d4 7c 8e 5c 2a a5 Oct 12 13:34:20: | 89 4e 7d b0 d8 53 d9 1c 35 e9 a7 7f 53 ce a0 f6 Oct 12 13:34:20: | 99 3f cc ae 3c 77 4f 8e a6 7f 28 41 77 11 58 2c Oct 12 13:34:20: | e1 01 d8 7b 4d 7c 46 fa 10 fe 7e b7 05 eb 2d 4f Oct 12 13:34:20: | 13 eb 75 8a 52 8e c5 13 9a d7 53 c0 1c 0e 0e 2c Oct 12 13:34:20: | 32 a9 1a 91 ab 5b 5c df 0f 35 e8 bb 66 17 c2 2b Oct 12 13:34:20: | f2 7a 55 88 ff 77 d3 e4 70 27 41 fe a0 dc 88 5e Oct 12 13:34:20: | a7 b2 18 5f b6 2d 6f d7 07 77 e5 b4 cc c2 c7 92 Oct 12 13:34:20: | f6 6e 9d 72 6a 06 ef fc 46 5f e4 b0 e6 35 ab 1f Oct 12 13:34:20: | f3 18 25 80 1e c0 a5 b7 37 a2 45 3a d3 e2 4e 08 Oct 12 13:34:20: | 79 31 5b f1 f3 05 cb ec 56 3d e9 15 Oct 12 13:34:20: | event_schedule_ms called for about 2000 ms Oct 12 13:34:20: | event_schedule_tv called for about 2 seconds and change Oct 12 13:34:20: | inserting event EVENT_v1_RETRANSMIT, timeout in 2.000000 seconds for #2 Oct 12 13:34:21: | handling event EVENT_PENDING_DDNS Oct 12 13:34:21: | event_schedule called for 60 seconds Oct 12 13:34:21: | event_schedule_tv called for about 60 seconds and change Oct 12 13:34:21: | inserting event EVENT_PENDING_DDNS, timeout in 60.000000 seconds Oct 12 13:34:21: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Oct 12 13:34:21: | handling event EVENT_SHUNT_SCAN Oct 12 13:34:21: | event_schedule called for 20 seconds Oct 12 13:34:21: | event_schedule_tv called for about 20 seconds and change Oct 12 13:34:21: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000000 seconds Oct 12 13:34:21: | scanning for shunt eroutes Oct 12 13:34:22: | handling event EVENT_v1_RETRANSMIT for state #2 Oct 12 13:34:22: | processing connection "mytunnel" Oct 12 13:34:22: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #2 attempt 0 of 0 Oct 12 13:34:22: | sending 396 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #2) Oct 12 13:34:22: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:22: | 08 10 20 01 ee ed 7e 06 00 00 01 8c 55 9d 01 57 Oct 12 13:34:22: | 1d 41 e2 b2 cd 8c 69 a9 e3 bc 26 a3 cf 93 58 0c Oct 12 13:34:22: | cf 4e cf c4 03 97 39 0a 9f c9 24 ac 9e 55 55 f7 Oct 12 13:34:22: | 63 33 92 30 47 eb dd 8d 15 74 17 b1 8b c1 7e 43 Oct 12 13:34:22: | bf 51 e0 cf e8 b0 a8 01 b9 4f 6c 64 2d a2 51 df Oct 12 13:34:22: | c2 6e a5 f0 da 5b 97 a8 ec 4a 89 79 8c d8 4f 6b Oct 12 13:34:22: | 69 a6 0c ca ab 35 f2 c0 4d 6b 67 ff 27 90 f6 0a Oct 12 13:34:22: | 20 1b 96 5d 5e dc 47 cd 0a ad cd 08 34 b0 46 53 Oct 12 13:34:22: | 14 6e a8 63 5d 98 34 8f bc a8 55 c0 98 9b d8 14 Oct 12 13:34:22: | b5 45 67 47 df 8f 33 9e 46 bb fa 7a 17 a7 de 2a Oct 12 13:34:22: | 1c ea af 51 73 88 90 ab 32 69 71 93 3b 06 c9 9b Oct 12 13:34:22: | cc 69 d0 e8 ca e0 79 91 4e 3f e9 4d 1b b7 00 9b Oct 12 13:34:22: | 6f 73 48 db 34 ea fc dc 4a 72 ab cc 3c f9 89 1e Oct 12 13:34:22: | 59 e5 12 5d 15 28 e5 86 c5 e8 d4 7c 8e 5c 2a a5 Oct 12 13:34:22: | 89 4e 7d b0 d8 53 d9 1c 35 e9 a7 7f 53 ce a0 f6 Oct 12 13:34:22: | 99 3f cc ae 3c 77 4f 8e a6 7f 28 41 77 11 58 2c Oct 12 13:34:22: | e1 01 d8 7b 4d 7c 46 fa 10 fe 7e b7 05 eb 2d 4f Oct 12 13:34:22: | 13 eb 75 8a 52 8e c5 13 9a d7 53 c0 1c 0e 0e 2c Oct 12 13:34:22: | 32 a9 1a 91 ab 5b 5c df 0f 35 e8 bb 66 17 c2 2b Oct 12 13:34:22: | f2 7a 55 88 ff 77 d3 e4 70 27 41 fe a0 dc 88 5e Oct 12 13:34:22: | a7 b2 18 5f b6 2d 6f d7 07 77 e5 b4 cc c2 c7 92 Oct 12 13:34:22: | f6 6e 9d 72 6a 06 ef fc 46 5f e4 b0 e6 35 ab 1f Oct 12 13:34:22: | f3 18 25 80 1e c0 a5 b7 37 a2 45 3a d3 e2 4e 08 Oct 12 13:34:22: | 79 31 5b f1 f3 05 cb ec 56 3d e9 15 Oct 12 13:34:22: | event_schedule_ms called for about 4000 ms Oct 12 13:34:22: | event_schedule_tv called for about 4 seconds and change Oct 12 13:34:22: | inserting event EVENT_v1_RETRANSMIT, timeout in 4.000000 seconds for #2 Oct 12 13:34:26: | handling event EVENT_v1_RETRANSMIT for state #2 Oct 12 13:34:26: | processing connection "mytunnel" Oct 12 13:34:26: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #2 attempt 0 of 0 Oct 12 13:34:26: | sending 396 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #2) Oct 12 13:34:26: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:26: | 08 10 20 01 ee ed 7e 06 00 00 01 8c 55 9d 01 57 Oct 12 13:34:26: | 1d 41 e2 b2 cd 8c 69 a9 e3 bc 26 a3 cf 93 58 0c Oct 12 13:34:26: | cf 4e cf c4 03 97 39 0a 9f c9 24 ac 9e 55 55 f7 Oct 12 13:34:26: | 63 33 92 30 47 eb dd 8d 15 74 17 b1 8b c1 7e 43 Oct 12 13:34:26: | bf 51 e0 cf e8 b0 a8 01 b9 4f 6c 64 2d a2 51 df Oct 12 13:34:26: | c2 6e a5 f0 da 5b 97 a8 ec 4a 89 79 8c d8 4f 6b Oct 12 13:34:26: | 69 a6 0c ca ab 35 f2 c0 4d 6b 67 ff 27 90 f6 0a Oct 12 13:34:26: | 20 1b 96 5d 5e dc 47 cd 0a ad cd 08 34 b0 46 53 Oct 12 13:34:26: | 14 6e a8 63 5d 98 34 8f bc a8 55 c0 98 9b d8 14 Oct 12 13:34:26: | b5 45 67 47 df 8f 33 9e 46 bb fa 7a 17 a7 de 2a Oct 12 13:34:26: | 1c ea af 51 73 88 90 ab 32 69 71 93 3b 06 c9 9b Oct 12 13:34:26: | cc 69 d0 e8 ca e0 79 91 4e 3f e9 4d 1b b7 00 9b Oct 12 13:34:26: | 6f 73 48 db 34 ea fc dc 4a 72 ab cc 3c f9 89 1e Oct 12 13:34:26: | 59 e5 12 5d 15 28 e5 86 c5 e8 d4 7c 8e 5c 2a a5 Oct 12 13:34:26: | 89 4e 7d b0 d8 53 d9 1c 35 e9 a7 7f 53 ce a0 f6 Oct 12 13:34:26: | 99 3f cc ae 3c 77 4f 8e a6 7f 28 41 77 11 58 2c Oct 12 13:34:26: | e1 01 d8 7b 4d 7c 46 fa 10 fe 7e b7 05 eb 2d 4f Oct 12 13:34:26: | 13 eb 75 8a 52 8e c5 13 9a d7 53 c0 1c 0e 0e 2c Oct 12 13:34:26: | 32 a9 1a 91 ab 5b 5c df 0f 35 e8 bb 66 17 c2 2b Oct 12 13:34:26: | f2 7a 55 88 ff 77 d3 e4 70 27 41 fe a0 dc 88 5e Oct 12 13:34:26: | a7 b2 18 5f b6 2d 6f d7 07 77 e5 b4 cc c2 c7 92 Oct 12 13:34:26: | f6 6e 9d 72 6a 06 ef fc 46 5f e4 b0 e6 35 ab 1f Oct 12 13:34:26: | f3 18 25 80 1e c0 a5 b7 37 a2 45 3a d3 e2 4e 08 Oct 12 13:34:26: | 79 31 5b f1 f3 05 cb ec 56 3d e9 15 Oct 12 13:34:26: | event_schedule_ms called for about 8000 ms Oct 12 13:34:26: | event_schedule_tv called for about 8 seconds and change Oct 12 13:34:26: | inserting event EVENT_v1_RETRANSMIT, timeout in 8.000000 seconds for #2 Oct 12 13:34:34: | handling event EVENT_v1_RETRANSMIT for state #2 Oct 12 13:34:34: | processing connection "mytunnel" Oct 12 13:34:34: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #2 attempt 0 of 0 Oct 12 13:34:34: | sending 396 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #2) Oct 12 13:34:34: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:34: | 08 10 20 01 ee ed 7e 06 00 00 01 8c 55 9d 01 57 Oct 12 13:34:34: | 1d 41 e2 b2 cd 8c 69 a9 e3 bc 26 a3 cf 93 58 0c Oct 12 13:34:34: | cf 4e cf c4 03 97 39 0a 9f c9 24 ac 9e 55 55 f7 Oct 12 13:34:34: | 63 33 92 30 47 eb dd 8d 15 74 17 b1 8b c1 7e 43 Oct 12 13:34:34: | bf 51 e0 cf e8 b0 a8 01 b9 4f 6c 64 2d a2 51 df Oct 12 13:34:34: | c2 6e a5 f0 da 5b 97 a8 ec 4a 89 79 8c d8 4f 6b Oct 12 13:34:34: | 69 a6 0c ca ab 35 f2 c0 4d 6b 67 ff 27 90 f6 0a Oct 12 13:34:34: | 20 1b 96 5d 5e dc 47 cd 0a ad cd 08 34 b0 46 53 Oct 12 13:34:34: | 14 6e a8 63 5d 98 34 8f bc a8 55 c0 98 9b d8 14 Oct 12 13:34:34: | b5 45 67 47 df 8f 33 9e 46 bb fa 7a 17 a7 de 2a Oct 12 13:34:34: | 1c ea af 51 73 88 90 ab 32 69 71 93 3b 06 c9 9b Oct 12 13:34:34: | cc 69 d0 e8 ca e0 79 91 4e 3f e9 4d 1b b7 00 9b Oct 12 13:34:34: | 6f 73 48 db 34 ea fc dc 4a 72 ab cc 3c f9 89 1e Oct 12 13:34:34: | 59 e5 12 5d 15 28 e5 86 c5 e8 d4 7c 8e 5c 2a a5 Oct 12 13:34:34: | 89 4e 7d b0 d8 53 d9 1c 35 e9 a7 7f 53 ce a0 f6 Oct 12 13:34:34: | 99 3f cc ae 3c 77 4f 8e a6 7f 28 41 77 11 58 2c Oct 12 13:34:34: | e1 01 d8 7b 4d 7c 46 fa 10 fe 7e b7 05 eb 2d 4f Oct 12 13:34:34: | 13 eb 75 8a 52 8e c5 13 9a d7 53 c0 1c 0e 0e 2c Oct 12 13:34:34: | 32 a9 1a 91 ab 5b 5c df 0f 35 e8 bb 66 17 c2 2b Oct 12 13:34:34: | f2 7a 55 88 ff 77 d3 e4 70 27 41 fe a0 dc 88 5e Oct 12 13:34:34: | a7 b2 18 5f b6 2d 6f d7 07 77 e5 b4 cc c2 c7 92 Oct 12 13:34:34: | f6 6e 9d 72 6a 06 ef fc 46 5f e4 b0 e6 35 ab 1f Oct 12 13:34:34: | f3 18 25 80 1e c0 a5 b7 37 a2 45 3a d3 e2 4e 08 Oct 12 13:34:34: | 79 31 5b f1 f3 05 cb ec 56 3d e9 15 Oct 12 13:34:34: | event_schedule_ms called for about 16000 ms Oct 12 13:34:34: | event_schedule_tv called for about 16 seconds and change Oct 12 13:34:34: | inserting event EVENT_v1_RETRANSMIT, timeout in 16.000000 seconds for #2 Oct 12 13:34:38: | handling event EVENT_NAT_T_KEEPALIVE Oct 12 13:34:38: | processing connection "mytunnel" Oct 12 13:34:38: | Sending of NAT-T KEEP-ALIVE enabled by per-conn configuration (nat_keepalive=yes) Oct 12 13:34:38: | processing connection "mytunnel" Oct 12 13:34:38: | Sending of NAT-T KEEP-ALIVE enabled by per-conn configuration (nat_keepalive=yes) Oct 12 13:34:41: | handling event EVENT_SHUNT_SCAN Oct 12 13:34:41: | event_schedule called for 20 seconds Oct 12 13:34:41: | event_schedule_tv called for about 20 seconds and change Oct 12 13:34:41: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000000 seconds Oct 12 13:34:41: | scanning for shunt eroutes Host B after ipsec auto --up mytunnel on Host B: Oct 12 13:34:50: | handling event EVENT_v1_RETRANSMIT for state #2 Oct 12 13:34:50: | processing connection "mytunnel" Oct 12 13:34:50: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #2 attempt 0 of 0 Oct 12 13:34:50: | sending 396 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #2) Oct 12 13:34:50: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:50: | 08 10 20 01 ee ed 7e 06 00 00 01 8c 55 9d 01 57 Oct 12 13:34:50: | 1d 41 e2 b2 cd 8c 69 a9 e3 bc 26 a3 cf 93 58 0c Oct 12 13:34:50: | cf 4e cf c4 03 97 39 0a 9f c9 24 ac 9e 55 55 f7 Oct 12 13:34:50: | 63 33 92 30 47 eb dd 8d 15 74 17 b1 8b c1 7e 43 Oct 12 13:34:50: | bf 51 e0 cf e8 b0 a8 01 b9 4f 6c 64 2d a2 51 df Oct 12 13:34:50: | c2 6e a5 f0 da 5b 97 a8 ec 4a 89 79 8c d8 4f 6b Oct 12 13:34:50: | 69 a6 0c ca ab 35 f2 c0 4d 6b 67 ff 27 90 f6 0a Oct 12 13:34:50: | 20 1b 96 5d 5e dc 47 cd 0a ad cd 08 34 b0 46 53 Oct 12 13:34:50: | 14 6e a8 63 5d 98 34 8f bc a8 55 c0 98 9b d8 14 Oct 12 13:34:50: | b5 45 67 47 df 8f 33 9e 46 bb fa 7a 17 a7 de 2a Oct 12 13:34:50: | 1c ea af 51 73 88 90 ab 32 69 71 93 3b 06 c9 9b Oct 12 13:34:50: | cc 69 d0 e8 ca e0 79 91 4e 3f e9 4d 1b b7 00 9b Oct 12 13:34:50: | 6f 73 48 db 34 ea fc dc 4a 72 ab cc 3c f9 89 1e Oct 12 13:34:50: | 59 e5 12 5d 15 28 e5 86 c5 e8 d4 7c 8e 5c 2a a5 Oct 12 13:34:50: | 89 4e 7d b0 d8 53 d9 1c 35 e9 a7 7f 53 ce a0 f6 Oct 12 13:34:50: | 99 3f cc ae 3c 77 4f 8e a6 7f 28 41 77 11 58 2c Oct 12 13:34:50: | e1 01 d8 7b 4d 7c 46 fa 10 fe 7e b7 05 eb 2d 4f Oct 12 13:34:50: | 13 eb 75 8a 52 8e c5 13 9a d7 53 c0 1c 0e 0e 2c Oct 12 13:34:50: | 32 a9 1a 91 ab 5b 5c df 0f 35 e8 bb 66 17 c2 2b Oct 12 13:34:50: | f2 7a 55 88 ff 77 d3 e4 70 27 41 fe a0 dc 88 5e Oct 12 13:34:50: | a7 b2 18 5f b6 2d 6f d7 07 77 e5 b4 cc c2 c7 92 Oct 12 13:34:50: | f6 6e 9d 72 6a 06 ef fc 46 5f e4 b0 e6 35 ab 1f Oct 12 13:34:50: | f3 18 25 80 1e c0 a5 b7 37 a2 45 3a d3 e2 4e 08 Oct 12 13:34:50: | 79 31 5b f1 f3 05 cb ec 56 3d e9 15 Oct 12 13:34:50: | event_schedule_ms called for about 32000 ms Oct 12 13:34:50: | event_schedule_tv called for about 32 seconds and change Oct 12 13:34:50: | inserting event EVENT_v1_RETRANSMIT, timeout in 32.000000 seconds for #2 Oct 12 13:34:53: | processing connection "mytunnel" Oct 12 13:34:53: | empty esp_info, returning defaults Oct 12 13:34:53: | creating state object #3 at 0x7f5c1bd34680 Oct 12 13:34:53: | parent state #3: new > STATE_UNDEFINED(ignore) Oct 12 13:34:53: | duplicating state object #1 as #3 Oct 12 13:34:53: | #3 quick_outI1:921 st->st_calculating == FALSE; Oct 12 13:34:53: | processing connection "mytunnel" Oct 12 13:34:53: | child state #3: STATE_UNDEFINED(ignore) > STATE_QUICK_I1(authenticated-ipsec) Oct 12 13:34:53: | ignore states: 0 Oct 12 13:34:53: | half-open-ike states: 0 Oct 12 13:34:53: | open-ike states: 0 Oct 12 13:34:53: | established-anonymous-ike states: 0 Oct 12 13:34:53: | established-authenticated-ike states: 1 Oct 12 13:34:53: | anonymous-ipsec states: 0 Oct 12 13:34:53: | authenticated-ipsec states: 2 Oct 12 13:34:53: | informational states: 0 Oct 12 13:34:53: | unknown states: 0 Oct 12 13:34:53: | category states: 3 count states: 3 Oct 12 13:34:53: | inserting state object #3 Oct 12 13:34:53: | finding hash chain in state hash table Oct 12 13:34:53: | ICOOKIE: 04 22 d3 32 db bc 3c fa Oct 12 13:34:53: | RCOOKIE: 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:53: | found hash chain 7 Oct 12 13:34:53: | list 0x7f5c1b7ee280 first entry 0x7f5c1bd2d868 Oct 12 13:34:53: | inserted state 0x7f5c1bd34680 entry 0x7f5c1bd34ce8 next 0x7f5c1bd2d868 prev-next 0x7f5c1b7ee280 into list Oct 12 13:34:53: | updated next state 0x7f5c1bd2d200 entry 0x7f5c1bd2d868 next 0x7f5c1bd2c648 prev-next 0x7f5c1bd34ce8 Oct 12 13:34:53: | finding hash chain in icookie hash table Oct 12 13:34:53: | ICOOKIE: 04 22 d3 32 db bc 3c fa Oct 12 13:34:53: | RCOOKIE: 00 00 00 00 00 00 00 00 Oct 12 13:34:53: | found hash chain 28 Oct 12 13:34:53: | list 0x7f5c1b7ee448 first entry 0x7f5c1bd2d880 Oct 12 13:34:53: | inserted state 0x7f5c1bd34680 entry 0x7f5c1bd34d00 next 0x7f5c1bd2d880 prev-next 0x7f5c1b7ee448 into list Oct 12 13:34:53: | updated next state 0x7f5c1bd2d200 entry 0x7f5c1bd2d880 next 0x7f5c1bd2c660 prev-next 0x7f5c1bd34d00 Oct 12 13:34:53: | event_schedule called for 0 seconds Oct 12 13:34:53: | event_schedule_tv called for about 0 seconds and change Oct 12 13:34:53: | inserting event EVENT_SO_DISCARD, timeout in 0.000000 seconds for #3 Oct 12 13:34:53: "mytunnel" #3: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW {using isakmp#1 msgid:71ee4afb proposal=defaults pfsgroup=OAKLEY_GROUP_MODP2048} Oct 12 13:34:53: | crypto helper 0: pcw_work: 0 Oct 12 13:34:53: | asking crypto helper 0 to do build KE and nonce; request ID 5 (len=2776, pcw_work=0) Oct 12 13:34:53: | #3 send_crypto_helper_request:613 st->st_calculating = TRUE; Oct 12 13:34:53: | state: #3 requesting EVENT_SO_DISCARD to be deleted Oct 12 13:34:53: | event_schedule called for 60 seconds Oct 12 13:34:53: | event_schedule_tv called for about 60 seconds and change Oct 12 13:34:53: | inserting event EVENT_CRYPTO_FAILED, timeout in 60.000000 seconds for #3 Oct 12 13:34:53: | crypto helper 0 read fd: 12 Oct 12 13:34:53: | crypto helper 0 doing build KE and nonce; request ID 5 Oct 12 13:34:53: | NSS: Value of Prime: Oct 12 13:34:53: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 Oct 12 13:34:53: | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 Oct 12 13:34:53: | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd Oct 12 13:34:53: | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 Oct 12 13:34:53: | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 Oct 12 13:34:53: | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed Oct 12 13:34:53: | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 Oct 12 13:34:53: | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 Oct 12 13:34:53: | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f Oct 12 13:34:53: | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb Oct 12 13:34:53: | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 Oct 12 13:34:53: | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b Oct 12 13:34:53: | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f Oct 12 13:34:53: | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 Oct 12 13:34:53: | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 Oct 12 13:34:53: | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff Oct 12 13:34:53: | NSS: Value of base: 02 Oct 12 13:34:53: | NSS: generated dh priv and pub keys: 256 Oct 12 13:34:53: | NSS: Local DH secret (pointer): 0x7f5c10018ec0 Oct 12 13:34:53: | NSS: Public DH value sent(computed in NSS): Oct 12 13:34:53: | fc be 5e 21 07 9f f2 43 fa 81 b1 9d cb 7f 71 fa Oct 12 13:34:53: | 03 57 c7 2a 6b ef 1e fe ba bc 75 c0 a0 18 d8 7f Oct 12 13:34:53: | 3e f3 82 27 c1 ba 66 12 55 c4 9a e6 47 41 f2 b9 Oct 12 13:34:53: | 77 e1 84 bf 8b 0d 01 42 27 a0 10 1d 4e 78 b5 67 Oct 12 13:34:53: | ff 3a a0 11 ae a2 96 dc e7 29 25 55 88 52 f8 8c Oct 12 13:34:53: | da 86 00 be 2d 99 2d 12 65 02 00 a4 0d 49 f9 ef Oct 12 13:34:53: | a3 c2 c2 ca 5d 50 44 ad 4b ba 08 46 b0 7c 3f 55 Oct 12 13:34:53: | d3 93 64 0a 49 f2 e5 71 e4 3e aa d5 61 70 01 ae Oct 12 13:34:53: | e4 99 b0 42 9c 34 c4 9a 9d fe 5b 45 9b d9 42 03 Oct 12 13:34:53: | 7b e2 a8 dd 48 41 78 df d6 ca 39 c2 bb 73 76 17 Oct 12 13:34:53: | 8a 05 05 82 10 83 8b 8c e5 fb 5f 01 36 3f ba ab Oct 12 13:34:53: | 73 32 9e 41 d5 83 a2 9a 4d aa 14 7b 79 64 47 a2 Oct 12 13:34:53: | c1 47 6b 9a c9 12 c6 1f 35 14 0d d3 9b 36 62 b3 Oct 12 13:34:53: | 22 7f 8e 1b 1d 53 d3 cb ae 6f 8e 5e 28 df 56 c6 Oct 12 13:34:53: | 1f 17 e3 7a 1d 59 ea 84 a1 64 96 8e 51 17 04 4d Oct 12 13:34:53: | 04 98 3c 09 46 12 13 94 d1 74 6f 8c 5a b8 7e 30 Oct 12 13:34:53: | NSS: Local DH public value (pointer): 0x7f5c100186b0 Oct 12 13:34:53: | Generated nonce: 68 44 84 49 ab 44 c4 79 7c 2c 39 38 e8 27 7a 31 Oct 12 13:34:53: | crypto helper 0 finished build KE and nonce; request ID 5 time elapsed 1804 usec Oct 12 13:34:53: | crypto helper 0 has finished work (pcw_work now 1) Oct 12 13:34:53: | crypto helper 0 replies to request ID 5 Oct 12 13:34:53: | calling continuation function 0x7f5c1b5333e0 Oct 12 13:34:53: | quick_outI1_continue for #3: calculated ke+nonce, sending I1 Oct 12 13:34:53: | #3 quick_outI1_continue:880 st->st_calculating = FALSE; Oct 12 13:34:53: | processing connection "mytunnel" Oct 12 13:34:53: | **emit ISAKMP Message: Oct 12 13:34:53: | initiator cookie: Oct 12 13:34:53: | 04 22 d3 32 db bc 3c fa Oct 12 13:34:53: | responder cookie: Oct 12 13:34:53: | 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:53: | next payload type: ISAKMP_NEXT_HASH (0x8) Oct 12 13:34:53: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 12 13:34:53: | exchange type: ISAKMP_XCHG_QUICK (0x20) Oct 12 13:34:53: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Oct 12 13:34:53: | message ID: fb 4a ee 71 Oct 12 13:34:53: | ***emit ISAKMP Hash Payload: Oct 12 13:34:53: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 12 13:34:53: | emitting 20 zero bytes of HASH into ISAKMP Hash Payload Oct 12 13:34:53: | emitting length of ISAKMP Hash Payload: 24 Oct 12 13:34:53: | empty esp_info, returning defaults Oct 12 13:34:53: | ***emit ISAKMP Security Association Payload: Oct 12 13:34:53: | next payload type: ISAKMP_NEXT_NONCE (0xa) Oct 12 13:34:53: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 12 13:34:53: | ****emit IPsec DOI SIT: Oct 12 13:34:53: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 12 13:34:53: | ikev1_out_sa pcn: 0 has 1 valid proposals Oct 12 13:34:53: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 4 Oct 12 13:34:53: | ****emit ISAKMP Proposal Payload: Oct 12 13:34:53: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:53: | proposal number: 0 (0x0) Oct 12 13:34:53: | protocol ID: PROTO_IPSEC_ESP (0x3) Oct 12 13:34:53: | SPI size: 4 (0x4) Oct 12 13:34:53: | number of transforms: 4 (0x4) Oct 12 13:34:53: | generate SPI: 10 73 0d 1c Oct 12 13:34:53: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload Oct 12 13:34:53: | SPI 10 73 0d 1c Oct 12 13:34:53: | *****emit ISAKMP Transform Payload (ESP): Oct 12 13:34:53: | next payload type: ISAKMP_NEXT_T (0x3) Oct 12 13:34:53: | ESP transform number: 0 (0x0) Oct 12 13:34:53: | ESP transform ID: ESP_AES (0xc) Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: GROUP_DESCRIPTION (0x8003) Oct 12 13:34:53: | length/value: 14 (0xe) Oct 12 13:34:53: | [14 is OAKLEY_GROUP_MODP2048] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: ENCAPSULATION_MODE (0x8004) Oct 12 13:34:53: | length/value: 1 (0x1) Oct 12 13:34:53: | [1 is ENCAPSULATION_MODE_TUNNEL] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: SA_LIFE_TYPE (0x8001) Oct 12 13:34:53: | length/value: 1 (0x1) Oct 12 13:34:53: | [1 is SA_LIFE_TYPE_SECONDS] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: SA_LIFE_DURATION (0x8002) Oct 12 13:34:53: | length/value: 28800 (0x7080) Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: AUTH_ALGORITHM (0x8005) Oct 12 13:34:53: | length/value: 2 (0x2) Oct 12 13:34:53: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: KEY_LENGTH (0x8006) Oct 12 13:34:53: | length/value: 128 (0x80) Oct 12 13:34:53: | emitting length of ISAKMP Transform Payload (ESP): 32 Oct 12 13:34:53: | *****emit ISAKMP Transform Payload (ESP): Oct 12 13:34:53: | next payload type: ISAKMP_NEXT_T (0x3) Oct 12 13:34:53: | ESP transform number: 1 (0x1) Oct 12 13:34:53: | ESP transform ID: ESP_AES (0xc) Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: GROUP_DESCRIPTION (0x8003) Oct 12 13:34:53: | length/value: 14 (0xe) Oct 12 13:34:53: | [14 is OAKLEY_GROUP_MODP2048] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: ENCAPSULATION_MODE (0x8004) Oct 12 13:34:53: | length/value: 1 (0x1) Oct 12 13:34:53: | [1 is ENCAPSULATION_MODE_TUNNEL] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: SA_LIFE_TYPE (0x8001) Oct 12 13:34:53: | length/value: 1 (0x1) Oct 12 13:34:53: | [1 is SA_LIFE_TYPE_SECONDS] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: SA_LIFE_DURATION (0x8002) Oct 12 13:34:53: | length/value: 28800 (0x7080) Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: AUTH_ALGORITHM (0x8005) Oct 12 13:34:53: | length/value: 1 (0x1) Oct 12 13:34:53: | [1 is AUTH_ALGORITHM_HMAC_MD5] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: KEY_LENGTH (0x8006) Oct 12 13:34:53: | length/value: 128 (0x80) Oct 12 13:34:53: | emitting length of ISAKMP Transform Payload (ESP): 32 Oct 12 13:34:53: | *****emit ISAKMP Transform Payload (ESP): Oct 12 13:34:53: | next payload type: ISAKMP_NEXT_T (0x3) Oct 12 13:34:53: | ESP transform number: 2 (0x2) Oct 12 13:34:53: | ESP transform ID: ESP_3DES (0x3) Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: GROUP_DESCRIPTION (0x8003) Oct 12 13:34:53: | length/value: 14 (0xe) Oct 12 13:34:53: | [14 is OAKLEY_GROUP_MODP2048] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: ENCAPSULATION_MODE (0x8004) Oct 12 13:34:53: | length/value: 1 (0x1) Oct 12 13:34:53: | [1 is ENCAPSULATION_MODE_TUNNEL] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: SA_LIFE_TYPE (0x8001) Oct 12 13:34:53: | length/value: 1 (0x1) Oct 12 13:34:53: | [1 is SA_LIFE_TYPE_SECONDS] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: SA_LIFE_DURATION (0x8002) Oct 12 13:34:53: | length/value: 28800 (0x7080) Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: AUTH_ALGORITHM (0x8005) Oct 12 13:34:53: | length/value: 2 (0x2) Oct 12 13:34:53: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Oct 12 13:34:53: | emitting length of ISAKMP Transform Payload (ESP): 28 Oct 12 13:34:53: | *****emit ISAKMP Transform Payload (ESP): Oct 12 13:34:53: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:53: | ESP transform number: 3 (0x3) Oct 12 13:34:53: | ESP transform ID: ESP_3DES (0x3) Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: GROUP_DESCRIPTION (0x8003) Oct 12 13:34:53: | length/value: 14 (0xe) Oct 12 13:34:53: | [14 is OAKLEY_GROUP_MODP2048] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: ENCAPSULATION_MODE (0x8004) Oct 12 13:34:53: | length/value: 1 (0x1) Oct 12 13:34:53: | [1 is ENCAPSULATION_MODE_TUNNEL] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: SA_LIFE_TYPE (0x8001) Oct 12 13:34:53: | length/value: 1 (0x1) Oct 12 13:34:53: | [1 is SA_LIFE_TYPE_SECONDS] Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: SA_LIFE_DURATION (0x8002) Oct 12 13:34:53: | length/value: 28800 (0x7080) Oct 12 13:34:53: | ******emit ISAKMP IPsec DOI attribute: Oct 12 13:34:53: | af+type: AUTH_ALGORITHM (0x8005) Oct 12 13:34:53: | length/value: 1 (0x1) Oct 12 13:34:53: | [1 is AUTH_ALGORITHM_HMAC_MD5] Oct 12 13:34:53: | emitting length of ISAKMP Transform Payload (ESP): 28 Oct 12 13:34:53: | emitting length of ISAKMP Proposal Payload: 132 Oct 12 13:34:53: | emitting length of ISAKMP Security Association Payload: 144 Oct 12 13:34:53: | ***emit ISAKMP Nonce Payload: Oct 12 13:34:53: | next payload type: ISAKMP_NEXT_KE (0x4) Oct 12 13:34:53: | emitting 16 raw bytes of Ni into ISAKMP Nonce Payload Oct 12 13:34:53: | Ni 68 44 84 49 ab 44 c4 79 7c 2c 39 38 e8 27 7a 31 Oct 12 13:34:53: | emitting length of ISAKMP Nonce Payload: 20 Oct 12 13:34:53: | saving DH priv (local secret) and pub key into state struct Oct 12 13:34:53: | ***emit ISAKMP Key Exchange Payload: Oct 12 13:34:53: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:34:53: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Oct 12 13:34:53: | keyex value fc be 5e 21 07 9f f2 43 fa 81 b1 9d cb 7f 71 fa Oct 12 13:34:53: | keyex value 03 57 c7 2a 6b ef 1e fe ba bc 75 c0 a0 18 d8 7f Oct 12 13:34:53: | keyex value 3e f3 82 27 c1 ba 66 12 55 c4 9a e6 47 41 f2 b9 Oct 12 13:34:53: | keyex value 77 e1 84 bf 8b 0d 01 42 27 a0 10 1d 4e 78 b5 67 Oct 12 13:34:53: | keyex value ff 3a a0 11 ae a2 96 dc e7 29 25 55 88 52 f8 8c Oct 12 13:34:53: | keyex value da 86 00 be 2d 99 2d 12 65 02 00 a4 0d 49 f9 ef Oct 12 13:34:53: | keyex value a3 c2 c2 ca 5d 50 44 ad 4b ba 08 46 b0 7c 3f 55 Oct 12 13:34:53: | keyex value d3 93 64 0a 49 f2 e5 71 e4 3e aa d5 61 70 01 ae Oct 12 13:34:53: | keyex value e4 99 b0 42 9c 34 c4 9a 9d fe 5b 45 9b d9 42 03 Oct 12 13:34:53: | keyex value 7b e2 a8 dd 48 41 78 df d6 ca 39 c2 bb 73 76 17 Oct 12 13:34:53: | keyex value 8a 05 05 82 10 83 8b 8c e5 fb 5f 01 36 3f ba ab Oct 12 13:34:53: | keyex value 73 32 9e 41 d5 83 a2 9a 4d aa 14 7b 79 64 47 a2 Oct 12 13:34:53: | keyex value c1 47 6b 9a c9 12 c6 1f 35 14 0d d3 9b 36 62 b3 Oct 12 13:34:53: | keyex value 22 7f 8e 1b 1d 53 d3 cb ae 6f 8e 5e 28 df 56 c6 Oct 12 13:34:53: | keyex value 1f 17 e3 7a 1d 59 ea 84 a1 64 96 8e 51 17 04 4d Oct 12 13:34:53: | keyex value 04 98 3c 09 46 12 13 94 d1 74 6f 8c 5a b8 7e 30 Oct 12 13:34:53: | emitting length of ISAKMP Key Exchange Payload: 260 Oct 12 13:34:53: | hmac prf: init 0x7f5c1bd32710 Oct 12 13:34:53: | hmac prf: init symkey symkey 0x7f5c1000b990 (length 20) Oct 12 13:34:53: | hmac prf: update Oct 12 13:34:53: | concat_symkey_bytes merge symkey(0x7f5c1000b990) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:53: | symkey: key(0x7f5c1000b990) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:53: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:53: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:53: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:34:53: | concat_symkey_bytes key(0x7f5c10011d00) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:53: | xor_symkey_chunk merge symkey(0x7f5c10011d00) bytes(0x7ffdf8372380/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:53: | symkey: key(0x7f5c10011d00) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:53: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:53: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:53: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:53: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:34:53: | xor_symkey_chunk key(0x7f5c1bd32370) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:53: | hmac prf: update bytes data 0x7f5c1bd349c0 (length 4) Oct 12 13:34:53: | concat_symkey_bytes merge symkey(0x7f5c1bd32370) bytes(0x7f5c1bd349c0/4) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:53: | symkey: key(0x7f5c1bd32370) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:53: | bytes: fb 4a ee 71 Oct 12 13:34:53: | concat_symkey_bytes key(0x7f5c10006f70) length(68) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:53: | append_symkey_bytes: free key 0x7f5c1bd32370 Oct 12 13:34:53: | hmac prf: update bytes data 0x7f5c1b7fe414 (length 424) Oct 12 13:34:53: | concat_symkey_bytes merge symkey(0x7f5c10006f70) bytes(0x7f5c1b7fe414/424) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:34:53: | symkey: key(0x7f5c10006f70) length(68) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:53: | bytes: 0a 00 00 90 00 00 00 01 00 00 00 01 00 00 00 84 Oct 12 13:34:53: | bytes: 00 03 04 04 10 73 0d 1c 03 00 00 20 00 0c 00 00 Oct 12 13:34:53: | bytes: 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 Oct 12 13:34:53: | bytes: 80 05 00 02 80 06 00 80 03 00 00 20 01 0c 00 00 Oct 12 13:34:53: | bytes: 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 Oct 12 13:34:53: | bytes: 80 05 00 01 80 06 00 80 03 00 00 1c 02 03 00 00 Oct 12 13:34:53: | bytes: 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 Oct 12 13:34:53: | bytes: 80 05 00 02 00 00 00 1c 03 03 00 00 80 03 00 0e Oct 12 13:34:53: | bytes: 80 04 00 01 80 01 00 01 80 02 70 80 80 05 00 01 Oct 12 13:34:53: | bytes: 04 00 00 14 68 44 84 49 ab 44 c4 79 7c 2c 39 38 Oct 12 13:34:53: | bytes: e8 27 7a 31 00 00 01 04 fc be 5e 21 07 9f f2 43 Oct 12 13:34:53: | bytes: fa 81 b1 9d cb 7f 71 fa 03 57 c7 2a 6b ef 1e fe Oct 12 13:34:53: | bytes: ba bc 75 c0 a0 18 d8 7f 3e f3 82 27 c1 ba 66 12 Oct 12 13:34:53: | bytes: 55 c4 9a e6 47 41 f2 b9 77 e1 84 bf 8b 0d 01 42 Oct 12 13:34:53: | bytes: 27 a0 10 1d 4e 78 b5 67 ff 3a a0 11 ae a2 96 dc Oct 12 13:34:53: | bytes: e7 29 25 55 88 52 f8 8c da 86 00 be 2d 99 2d 12 Oct 12 13:34:53: | bytes: 65 02 00 a4 0d 49 f9 ef a3 c2 c2 ca 5d 50 44 ad Oct 12 13:34:53: | bytes: 4b ba 08 46 b0 7c 3f 55 d3 93 64 0a 49 f2 e5 71 Oct 12 13:34:53: | bytes: e4 3e aa d5 61 70 01 ae e4 99 b0 42 9c 34 c4 9a Oct 12 13:34:53: | bytes: 9d fe 5b 45 9b d9 42 03 7b e2 a8 dd 48 41 78 df Oct 12 13:34:53: | bytes: d6 ca 39 c2 bb 73 76 17 8a 05 05 82 10 83 8b 8c Oct 12 13:34:53: | bytes: e5 fb 5f 01 36 3f ba ab 73 32 9e 41 d5 83 a2 9a Oct 12 13:34:53: | bytes: 4d aa 14 7b 79 64 47 a2 c1 47 6b 9a c9 12 c6 1f Oct 12 13:34:53: | bytes: 35 14 0d d3 9b 36 62 b3 22 7f 8e 1b 1d 53 d3 cb Oct 12 13:34:53: | bytes: ae 6f 8e 5e 28 df 56 c6 1f 17 e3 7a 1d 59 ea 84 Oct 12 13:34:53: | bytes: a1 64 96 8e 51 17 04 4d 04 98 3c 09 46 12 13 94 Oct 12 13:34:53: | bytes: d1 74 6f 8c 5a b8 7e 30 Oct 12 13:34:53: | concat_symkey_bytes key(0x7f5c1bd32370) length(492) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:53: | append_symkey_bytes: free key 0x7f5c10006f70 Oct 12 13:34:53: | hmac prf: final Oct 12 13:34:53: | prf inner hash: hash(oakley_sha) symkey(0x7f5c1bd32370) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:34:53: | symkey: key(0x7f5c1bd32370) length(492) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:53: | prf inner hash: key(0x7f5c10006f70) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:53: | prf inner:: free key 0x7f5c1bd32370 Oct 12 13:34:53: | xor_symkey_chunk merge symkey(0x7f5c10011d00) bytes(0x7ffdf8372360/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:34:53: | symkey: key(0x7f5c10011d00) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:53: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:53: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:53: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:53: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:34:53: | xor_symkey_chunk key(0x7f5c1bd32370) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:53: | concat: merge symkey(1: 0x7f5c1bd32370) symkey(2: 0x7f5c10006f70) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:34:53: | symkey 1: key(0x7f5c1bd32370) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:34:53: | symkey 2: key(0x7f5c10006f70) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:34:53: | concat: key(0x7f5c1bd30ba0) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:53: | append_symkey_symkey: free key 0x7f5c1bd32370 Oct 12 13:34:53: | prf hashed inner:: free key 0x7f5c10006f70 Oct 12 13:34:53: | prf key: free key 0x7f5c10011d00 Oct 12 13:34:53: | prf outer hash hash(oakley_sha) symkey(0x7f5c1bd30ba0) to bytes Oct 12 13:34:53: | symkey: key(0x7f5c1bd30ba0) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:34:53: | prf outer hash b2 65 3c fa a6 46 8b ad 4e bf db f6 57 3e 8c 05 Oct 12 13:34:53: | prf outer hash 99 db 45 10 Oct 12 13:34:53: | prf outer: free key 0x7f5c1bd30ba0 Oct 12 13:34:53: | prf final bytes b2 65 3c fa a6 46 8b ad 4e bf db f6 57 3e 8c 05 Oct 12 13:34:53: | prf final bytes 99 db 45 10 Oct 12 13:34:53: | HASH(1) computed: Oct 12 13:34:53: | b2 65 3c fa a6 46 8b ad 4e bf db f6 57 3e 8c 05 Oct 12 13:34:53: | 99 db 45 10 Oct 12 13:34:53: | last Phase 1 IV: 5d f7 19 b6 f4 28 d6 10 08 84 df ff cf 2d 5b e9 Oct 12 13:34:53: | current Phase 1 IV: 5d f7 19 b6 f4 28 d6 10 08 84 df ff cf 2d 5b e9 Oct 12 13:34:53: | computed Phase 2 IV: Oct 12 13:34:53: | e1 54 15 4e 47 81 41 ed fe 88 32 07 a1 65 a1 13 Oct 12 13:34:53: | 74 69 dc 67 Oct 12 13:34:53: | encrypting: 01 00 00 18 b2 65 3c fa a6 46 8b ad 4e bf db f6 Oct 12 13:34:53: | encrypting: 57 3e 8c 05 99 db 45 10 0a 00 00 90 00 00 00 01 Oct 12 13:34:53: | encrypting: 00 00 00 01 00 00 00 84 00 03 04 04 10 73 0d 1c Oct 12 13:34:53: | encrypting: 03 00 00 20 00 0c 00 00 80 03 00 0e 80 04 00 01 Oct 12 13:34:53: | encrypting: 80 01 00 01 80 02 70 80 80 05 00 02 80 06 00 80 Oct 12 13:34:53: | encrypting: 03 00 00 20 01 0c 00 00 80 03 00 0e 80 04 00 01 Oct 12 13:34:53: | encrypting: 80 01 00 01 80 02 70 80 80 05 00 01 80 06 00 80 Oct 12 13:34:53: | encrypting: 03 00 00 1c 02 03 00 00 80 03 00 0e 80 04 00 01 Oct 12 13:34:53: | encrypting: 80 01 00 01 80 02 70 80 80 05 00 02 00 00 00 1c Oct 12 13:34:53: | encrypting: 03 03 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 Oct 12 13:34:53: | encrypting: 80 02 70 80 80 05 00 01 04 00 00 14 68 44 84 49 Oct 12 13:34:53: | encrypting: ab 44 c4 79 7c 2c 39 38 e8 27 7a 31 00 00 01 04 Oct 12 13:34:53: | encrypting: fc be 5e 21 07 9f f2 43 fa 81 b1 9d cb 7f 71 fa Oct 12 13:34:53: | encrypting: 03 57 c7 2a 6b ef 1e fe ba bc 75 c0 a0 18 d8 7f Oct 12 13:34:53: | encrypting: 3e f3 82 27 c1 ba 66 12 55 c4 9a e6 47 41 f2 b9 Oct 12 13:34:53: | encrypting: 77 e1 84 bf 8b 0d 01 42 27 a0 10 1d 4e 78 b5 67 Oct 12 13:34:53: | encrypting: ff 3a a0 11 ae a2 96 dc e7 29 25 55 88 52 f8 8c Oct 12 13:34:53: | encrypting: da 86 00 be 2d 99 2d 12 65 02 00 a4 0d 49 f9 ef Oct 12 13:34:53: | encrypting: a3 c2 c2 ca 5d 50 44 ad 4b ba 08 46 b0 7c 3f 55 Oct 12 13:34:53: | encrypting: d3 93 64 0a 49 f2 e5 71 e4 3e aa d5 61 70 01 ae Oct 12 13:34:53: | encrypting: e4 99 b0 42 9c 34 c4 9a 9d fe 5b 45 9b d9 42 03 Oct 12 13:34:53: | encrypting: 7b e2 a8 dd 48 41 78 df d6 ca 39 c2 bb 73 76 17 Oct 12 13:34:53: | encrypting: 8a 05 05 82 10 83 8b 8c e5 fb 5f 01 36 3f ba ab Oct 12 13:34:53: | encrypting: 73 32 9e 41 d5 83 a2 9a 4d aa 14 7b 79 64 47 a2 Oct 12 13:34:53: | encrypting: c1 47 6b 9a c9 12 c6 1f 35 14 0d d3 9b 36 62 b3 Oct 12 13:34:53: | encrypting: 22 7f 8e 1b 1d 53 d3 cb ae 6f 8e 5e 28 df 56 c6 Oct 12 13:34:53: | encrypting: 1f 17 e3 7a 1d 59 ea 84 a1 64 96 8e 51 17 04 4d Oct 12 13:34:53: | encrypting: 04 98 3c 09 46 12 13 94 d1 74 6f 8c 5a b8 7e 30 Oct 12 13:34:53: | IV: e1 54 15 4e 47 81 41 ed fe 88 32 07 a1 65 a1 13 Oct 12 13:34:53: | IV: 74 69 dc 67 Oct 12 13:34:53: | unpadded size is: 448 Oct 12 13:34:53: | encrypting 448 using OAKLEY_AES_CBC Oct 12 13:34:53: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:34:53: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:34:53: | next IV: 50 4a 7f 7c b3 85 c1 ca 44 2d ce b1 7c 0a bc df Oct 12 13:34:53: | no IKEv1 message padding required Oct 12 13:34:53: | emitting length of ISAKMP Message: 476 Oct 12 13:34:53: | sending 476 bytes for reply packet from quick_outI1 through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #3) Oct 12 13:34:53: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:53: | 08 10 20 01 fb 4a ee 71 00 00 01 dc 6b 30 2c 54 Oct 12 13:34:53: | bc 92 21 42 9f e4 8c d1 60 de 73 08 ae e7 25 54 Oct 12 13:34:53: | 94 ee f1 c4 c4 7e f9 c4 1d 6e f0 5f df 3e 72 f4 Oct 12 13:34:53: | 1c a3 04 73 ab 23 02 76 0d 49 1f 92 82 f0 61 09 Oct 12 13:34:53: | 38 2e a8 09 9f 95 2d 0c 62 d7 b3 65 ef 4e 6b 05 Oct 12 13:34:53: | 17 72 da ba a7 a7 b8 e7 c8 2c a4 00 eb 2d b7 ff Oct 12 13:34:53: | 5d a8 43 ff a2 71 80 76 f8 8b 52 3e 37 b0 e2 dd Oct 12 13:34:53: | 45 c6 33 b0 fc 67 0c 14 ce 66 4b 39 8b 86 5f f8 Oct 12 13:34:53: | 0a ab 7c da 71 7e b8 92 ce 1a 38 43 66 78 78 13 Oct 12 13:34:53: | f0 cf bb ca 6b a2 fd ec 29 44 bf eb e0 35 27 9b Oct 12 13:34:53: | 63 06 71 6b 07 93 24 ea 29 40 7c 5a a9 06 f8 2b Oct 12 13:34:53: | 1c 2e a3 f1 65 62 b4 ae 5f 4c ac b2 79 5c 25 f8 Oct 12 13:34:53: | 93 5f fa f5 af 90 82 8c 6d de a0 e3 4d bb 96 c1 Oct 12 13:34:53: | f6 45 a0 c7 5c 15 61 16 58 55 09 70 2e 6b bf f7 Oct 12 13:34:53: | 09 47 4c 02 e8 6b 58 40 86 a2 8b c9 2a 45 2c d9 Oct 12 13:34:53: | 7a 63 e1 5a a6 09 81 70 6b 82 70 56 ec a6 4e 8e Oct 12 13:34:53: | 4a 34 fc 06 e3 e8 ce 4e 7a b1 19 b7 77 5e 54 c8 Oct 12 13:34:53: | 1d 58 7a 54 4a 76 33 3a b8 40 54 70 8d 9d ea 6e Oct 12 13:34:53: | e8 82 af b8 9c da 41 4c 97 af bc 9b d5 01 82 fc Oct 12 13:34:53: | c5 ba 1c 43 f8 04 c3 ad cf b8 f1 05 6a 44 6e 4a Oct 12 13:34:53: | 31 3d 55 ae fb 40 ca c0 53 2e 32 51 7f 80 8f 6e Oct 12 13:34:53: | bf f1 99 13 a0 d0 71 c4 cd c9 b8 af 77 b1 38 95 Oct 12 13:34:53: | c2 6e 5c f5 40 5a 31 c4 99 f7 bd 0c 83 45 59 bb Oct 12 13:34:53: | 7f c2 88 d5 3b 31 d1 cd c1 5b 08 48 72 e3 35 e3 Oct 12 13:34:53: | 4b 8c 5b 9e a2 9f 84 42 07 25 d4 64 d2 85 3e 4c Oct 12 13:34:53: | 5f 9d b4 fd 5f f1 36 13 2e 34 1d a6 cf f5 53 4a Oct 12 13:34:53: | ca da 4b 9e 98 16 a2 66 21 7b 2b f3 fe 75 f1 32 Oct 12 13:34:53: | 5f 9d 46 8b 53 cb f8 7e 0b 1d 38 71 50 4a 7f 7c Oct 12 13:34:53: | b3 85 c1 ca 44 2d ce b1 7c 0a bc df Oct 12 13:34:53: | state: #3 requesting EVENT_CRYPTO_FAILED to be deleted Oct 12 13:34:53: | event_schedule_ms called for about 500 ms Oct 12 13:34:53: | event_schedule_tv called for about 0 seconds and change Oct 12 13:34:53: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500000 seconds for #3 Oct 12 13:34:54: | handling event EVENT_v1_RETRANSMIT for state #3 Oct 12 13:34:54: | processing connection "mytunnel" Oct 12 13:34:54: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #3 attempt 1 of 0 Oct 12 13:34:54: | sending 476 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #3) Oct 12 13:34:54: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:54: | 08 10 20 01 fb 4a ee 71 00 00 01 dc 6b 30 2c 54 Oct 12 13:34:54: | bc 92 21 42 9f e4 8c d1 60 de 73 08 ae e7 25 54 Oct 12 13:34:54: | 94 ee f1 c4 c4 7e f9 c4 1d 6e f0 5f df 3e 72 f4 Oct 12 13:34:54: | 1c a3 04 73 ab 23 02 76 0d 49 1f 92 82 f0 61 09 Oct 12 13:34:54: | 38 2e a8 09 9f 95 2d 0c 62 d7 b3 65 ef 4e 6b 05 Oct 12 13:34:54: | 17 72 da ba a7 a7 b8 e7 c8 2c a4 00 eb 2d b7 ff Oct 12 13:34:54: | 5d a8 43 ff a2 71 80 76 f8 8b 52 3e 37 b0 e2 dd Oct 12 13:34:54: | 45 c6 33 b0 fc 67 0c 14 ce 66 4b 39 8b 86 5f f8 Oct 12 13:34:54: | 0a ab 7c da 71 7e b8 92 ce 1a 38 43 66 78 78 13 Oct 12 13:34:54: | f0 cf bb ca 6b a2 fd ec 29 44 bf eb e0 35 27 9b Oct 12 13:34:54: | 63 06 71 6b 07 93 24 ea 29 40 7c 5a a9 06 f8 2b Oct 12 13:34:54: | 1c 2e a3 f1 65 62 b4 ae 5f 4c ac b2 79 5c 25 f8 Oct 12 13:34:54: | 93 5f fa f5 af 90 82 8c 6d de a0 e3 4d bb 96 c1 Oct 12 13:34:54: | f6 45 a0 c7 5c 15 61 16 58 55 09 70 2e 6b bf f7 Oct 12 13:34:54: | 09 47 4c 02 e8 6b 58 40 86 a2 8b c9 2a 45 2c d9 Oct 12 13:34:54: | 7a 63 e1 5a a6 09 81 70 6b 82 70 56 ec a6 4e 8e Oct 12 13:34:54: | 4a 34 fc 06 e3 e8 ce 4e 7a b1 19 b7 77 5e 54 c8 Oct 12 13:34:54: | 1d 58 7a 54 4a 76 33 3a b8 40 54 70 8d 9d ea 6e Oct 12 13:34:54: | e8 82 af b8 9c da 41 4c 97 af bc 9b d5 01 82 fc Oct 12 13:34:54: | c5 ba 1c 43 f8 04 c3 ad cf b8 f1 05 6a 44 6e 4a Oct 12 13:34:54: | 31 3d 55 ae fb 40 ca c0 53 2e 32 51 7f 80 8f 6e Oct 12 13:34:54: | bf f1 99 13 a0 d0 71 c4 cd c9 b8 af 77 b1 38 95 Oct 12 13:34:54: | c2 6e 5c f5 40 5a 31 c4 99 f7 bd 0c 83 45 59 bb Oct 12 13:34:54: | 7f c2 88 d5 3b 31 d1 cd c1 5b 08 48 72 e3 35 e3 Oct 12 13:34:54: | 4b 8c 5b 9e a2 9f 84 42 07 25 d4 64 d2 85 3e 4c Oct 12 13:34:54: | 5f 9d b4 fd 5f f1 36 13 2e 34 1d a6 cf f5 53 4a Oct 12 13:34:54: | ca da 4b 9e 98 16 a2 66 21 7b 2b f3 fe 75 f1 32 Oct 12 13:34:54: | 5f 9d 46 8b 53 cb f8 7e 0b 1d 38 71 50 4a 7f 7c Oct 12 13:34:54: | b3 85 c1 ca 44 2d ce b1 7c 0a bc df Oct 12 13:34:54: | event_schedule_ms called for about 500 ms Oct 12 13:34:54: | event_schedule_tv called for about 0 seconds and change Oct 12 13:34:54: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500000 seconds for #3 Oct 12 13:34:54: | handling event EVENT_v1_RETRANSMIT for state #3 Oct 12 13:34:54: | processing connection "mytunnel" Oct 12 13:34:54: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #3 attempt 1 of 0 Oct 12 13:34:54: | sending 476 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #3) Oct 12 13:34:54: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:54: | 08 10 20 01 fb 4a ee 71 00 00 01 dc 6b 30 2c 54 Oct 12 13:34:54: | bc 92 21 42 9f e4 8c d1 60 de 73 08 ae e7 25 54 Oct 12 13:34:54: | 94 ee f1 c4 c4 7e f9 c4 1d 6e f0 5f df 3e 72 f4 Oct 12 13:34:54: | 1c a3 04 73 ab 23 02 76 0d 49 1f 92 82 f0 61 09 Oct 12 13:34:54: | 38 2e a8 09 9f 95 2d 0c 62 d7 b3 65 ef 4e 6b 05 Oct 12 13:34:54: | 17 72 da ba a7 a7 b8 e7 c8 2c a4 00 eb 2d b7 ff Oct 12 13:34:54: | 5d a8 43 ff a2 71 80 76 f8 8b 52 3e 37 b0 e2 dd Oct 12 13:34:54: | 45 c6 33 b0 fc 67 0c 14 ce 66 4b 39 8b 86 5f f8 Oct 12 13:34:54: | 0a ab 7c da 71 7e b8 92 ce 1a 38 43 66 78 78 13 Oct 12 13:34:54: | f0 cf bb ca 6b a2 fd ec 29 44 bf eb e0 35 27 9b Oct 12 13:34:54: | 63 06 71 6b 07 93 24 ea 29 40 7c 5a a9 06 f8 2b Oct 12 13:34:54: | 1c 2e a3 f1 65 62 b4 ae 5f 4c ac b2 79 5c 25 f8 Oct 12 13:34:54: | 93 5f fa f5 af 90 82 8c 6d de a0 e3 4d bb 96 c1 Oct 12 13:34:54: | f6 45 a0 c7 5c 15 61 16 58 55 09 70 2e 6b bf f7 Oct 12 13:34:54: | 09 47 4c 02 e8 6b 58 40 86 a2 8b c9 2a 45 2c d9 Oct 12 13:34:54: | 7a 63 e1 5a a6 09 81 70 6b 82 70 56 ec a6 4e 8e Oct 12 13:34:54: | 4a 34 fc 06 e3 e8 ce 4e 7a b1 19 b7 77 5e 54 c8 Oct 12 13:34:54: | 1d 58 7a 54 4a 76 33 3a b8 40 54 70 8d 9d ea 6e Oct 12 13:34:54: | e8 82 af b8 9c da 41 4c 97 af bc 9b d5 01 82 fc Oct 12 13:34:54: | c5 ba 1c 43 f8 04 c3 ad cf b8 f1 05 6a 44 6e 4a Oct 12 13:34:54: | 31 3d 55 ae fb 40 ca c0 53 2e 32 51 7f 80 8f 6e Oct 12 13:34:54: | bf f1 99 13 a0 d0 71 c4 cd c9 b8 af 77 b1 38 95 Oct 12 13:34:54: | c2 6e 5c f5 40 5a 31 c4 99 f7 bd 0c 83 45 59 bb Oct 12 13:34:54: | 7f c2 88 d5 3b 31 d1 cd c1 5b 08 48 72 e3 35 e3 Oct 12 13:34:54: | 4b 8c 5b 9e a2 9f 84 42 07 25 d4 64 d2 85 3e 4c Oct 12 13:34:54: | 5f 9d b4 fd 5f f1 36 13 2e 34 1d a6 cf f5 53 4a Oct 12 13:34:54: | ca da 4b 9e 98 16 a2 66 21 7b 2b f3 fe 75 f1 32 Oct 12 13:34:54: | 5f 9d 46 8b 53 cb f8 7e 0b 1d 38 71 50 4a 7f 7c Oct 12 13:34:54: | b3 85 c1 ca 44 2d ce b1 7c 0a bc df Oct 12 13:34:54: | event_schedule_ms called for about 1000 ms Oct 12 13:34:54: | event_schedule_tv called for about 1 seconds and change Oct 12 13:34:54: | inserting event EVENT_v1_RETRANSMIT, timeout in 1.000000 seconds for #3 Oct 12 13:34:55: | handling event EVENT_v1_RETRANSMIT for state #3 Oct 12 13:34:55: | processing connection "mytunnel" Oct 12 13:34:55: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #3 attempt 1 of 0 Oct 12 13:34:55: | sending 476 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #3) Oct 12 13:34:55: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:55: | 08 10 20 01 fb 4a ee 71 00 00 01 dc 6b 30 2c 54 Oct 12 13:34:55: | bc 92 21 42 9f e4 8c d1 60 de 73 08 ae e7 25 54 Oct 12 13:34:55: | 94 ee f1 c4 c4 7e f9 c4 1d 6e f0 5f df 3e 72 f4 Oct 12 13:34:55: | 1c a3 04 73 ab 23 02 76 0d 49 1f 92 82 f0 61 09 Oct 12 13:34:55: | 38 2e a8 09 9f 95 2d 0c 62 d7 b3 65 ef 4e 6b 05 Oct 12 13:34:55: | 17 72 da ba a7 a7 b8 e7 c8 2c a4 00 eb 2d b7 ff Oct 12 13:34:55: | 5d a8 43 ff a2 71 80 76 f8 8b 52 3e 37 b0 e2 dd Oct 12 13:34:55: | 45 c6 33 b0 fc 67 0c 14 ce 66 4b 39 8b 86 5f f8 Oct 12 13:34:55: | 0a ab 7c da 71 7e b8 92 ce 1a 38 43 66 78 78 13 Oct 12 13:34:55: | f0 cf bb ca 6b a2 fd ec 29 44 bf eb e0 35 27 9b Oct 12 13:34:55: | 63 06 71 6b 07 93 24 ea 29 40 7c 5a a9 06 f8 2b Oct 12 13:34:55: | 1c 2e a3 f1 65 62 b4 ae 5f 4c ac b2 79 5c 25 f8 Oct 12 13:34:55: | 93 5f fa f5 af 90 82 8c 6d de a0 e3 4d bb 96 c1 Oct 12 13:34:55: | f6 45 a0 c7 5c 15 61 16 58 55 09 70 2e 6b bf f7 Oct 12 13:34:55: | 09 47 4c 02 e8 6b 58 40 86 a2 8b c9 2a 45 2c d9 Oct 12 13:34:55: | 7a 63 e1 5a a6 09 81 70 6b 82 70 56 ec a6 4e 8e Oct 12 13:34:55: | 4a 34 fc 06 e3 e8 ce 4e 7a b1 19 b7 77 5e 54 c8 Oct 12 13:34:55: | 1d 58 7a 54 4a 76 33 3a b8 40 54 70 8d 9d ea 6e Oct 12 13:34:55: | e8 82 af b8 9c da 41 4c 97 af bc 9b d5 01 82 fc Oct 12 13:34:55: | c5 ba 1c 43 f8 04 c3 ad cf b8 f1 05 6a 44 6e 4a Oct 12 13:34:55: | 31 3d 55 ae fb 40 ca c0 53 2e 32 51 7f 80 8f 6e Oct 12 13:34:55: | bf f1 99 13 a0 d0 71 c4 cd c9 b8 af 77 b1 38 95 Oct 12 13:34:55: | c2 6e 5c f5 40 5a 31 c4 99 f7 bd 0c 83 45 59 bb Oct 12 13:34:55: | 7f c2 88 d5 3b 31 d1 cd c1 5b 08 48 72 e3 35 e3 Oct 12 13:34:55: | 4b 8c 5b 9e a2 9f 84 42 07 25 d4 64 d2 85 3e 4c Oct 12 13:34:55: | 5f 9d b4 fd 5f f1 36 13 2e 34 1d a6 cf f5 53 4a Oct 12 13:34:55: | ca da 4b 9e 98 16 a2 66 21 7b 2b f3 fe 75 f1 32 Oct 12 13:34:55: | 5f 9d 46 8b 53 cb f8 7e 0b 1d 38 71 50 4a 7f 7c Oct 12 13:34:55: | b3 85 c1 ca 44 2d ce b1 7c 0a bc df Oct 12 13:34:55: | event_schedule_ms called for about 2000 ms Oct 12 13:34:55: | event_schedule_tv called for about 2 seconds and change Oct 12 13:34:55: | inserting event EVENT_v1_RETRANSMIT, timeout in 2.000000 seconds for #3 Oct 12 13:34:57: | handling event EVENT_v1_RETRANSMIT for state #3 Oct 12 13:34:57: | processing connection "mytunnel" Oct 12 13:34:57: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #3 attempt 1 of 0 Oct 12 13:34:57: | sending 476 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #3) Oct 12 13:34:57: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:34:57: | 08 10 20 01 fb 4a ee 71 00 00 01 dc 6b 30 2c 54 Oct 12 13:34:57: | bc 92 21 42 9f e4 8c d1 60 de 73 08 ae e7 25 54 Oct 12 13:34:57: | 94 ee f1 c4 c4 7e f9 c4 1d 6e f0 5f df 3e 72 f4 Oct 12 13:34:57: | 1c a3 04 73 ab 23 02 76 0d 49 1f 92 82 f0 61 09 Oct 12 13:34:57: | 38 2e a8 09 9f 95 2d 0c 62 d7 b3 65 ef 4e 6b 05 Oct 12 13:34:57: | 17 72 da ba a7 a7 b8 e7 c8 2c a4 00 eb 2d b7 ff Oct 12 13:34:57: | 5d a8 43 ff a2 71 80 76 f8 8b 52 3e 37 b0 e2 dd Oct 12 13:34:57: | 45 c6 33 b0 fc 67 0c 14 ce 66 4b 39 8b 86 5f f8 Oct 12 13:34:57: | 0a ab 7c da 71 7e b8 92 ce 1a 38 43 66 78 78 13 Oct 12 13:34:57: | f0 cf bb ca 6b a2 fd ec 29 44 bf eb e0 35 27 9b Oct 12 13:34:57: | 63 06 71 6b 07 93 24 ea 29 40 7c 5a a9 06 f8 2b Oct 12 13:34:57: | 1c 2e a3 f1 65 62 b4 ae 5f 4c ac b2 79 5c 25 f8 Oct 12 13:34:57: | 93 5f fa f5 af 90 82 8c 6d de a0 e3 4d bb 96 c1 Oct 12 13:34:57: | f6 45 a0 c7 5c 15 61 16 58 55 09 70 2e 6b bf f7 Oct 12 13:34:57: | 09 47 4c 02 e8 6b 58 40 86 a2 8b c9 2a 45 2c d9 Oct 12 13:34:57: | 7a 63 e1 5a a6 09 81 70 6b 82 70 56 ec a6 4e 8e Oct 12 13:34:57: | 4a 34 fc 06 e3 e8 ce 4e 7a b1 19 b7 77 5e 54 c8 Oct 12 13:34:57: | 1d 58 7a 54 4a 76 33 3a b8 40 54 70 8d 9d ea 6e Oct 12 13:34:57: | e8 82 af b8 9c da 41 4c 97 af bc 9b d5 01 82 fc Oct 12 13:34:57: | c5 ba 1c 43 f8 04 c3 ad cf b8 f1 05 6a 44 6e 4a Oct 12 13:34:57: | 31 3d 55 ae fb 40 ca c0 53 2e 32 51 7f 80 8f 6e Oct 12 13:34:57: | bf f1 99 13 a0 d0 71 c4 cd c9 b8 af 77 b1 38 95 Oct 12 13:34:57: | c2 6e 5c f5 40 5a 31 c4 99 f7 bd 0c 83 45 59 bb Oct 12 13:34:57: | 7f c2 88 d5 3b 31 d1 cd c1 5b 08 48 72 e3 35 e3 Oct 12 13:34:57: | 4b 8c 5b 9e a2 9f 84 42 07 25 d4 64 d2 85 3e 4c Oct 12 13:34:57: | 5f 9d b4 fd 5f f1 36 13 2e 34 1d a6 cf f5 53 4a Oct 12 13:34:57: | ca da 4b 9e 98 16 a2 66 21 7b 2b f3 fe 75 f1 32 Oct 12 13:34:57: | 5f 9d 46 8b 53 cb f8 7e 0b 1d 38 71 50 4a 7f 7c Oct 12 13:34:57: | b3 85 c1 ca 44 2d ce b1 7c 0a bc df Oct 12 13:34:57: | event_schedule_ms called for about 4000 ms Oct 12 13:34:57: | event_schedule_tv called for about 4 seconds and change Oct 12 13:34:57: | inserting event EVENT_v1_RETRANSMIT, timeout in 4.000000 seconds for #3 Oct 12 13:35:01: | handling event EVENT_SHUNT_SCAN Oct 12 13:35:01: | event_schedule called for 20 seconds Oct 12 13:35:01: | event_schedule_tv called for about 20 seconds and change Oct 12 13:35:01: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000000 seconds Oct 12 13:35:01: | scanning for shunt eroutes Oct 12 13:35:01: | handling event EVENT_v1_RETRANSMIT for state #3 Oct 12 13:35:01: | processing connection "mytunnel" Oct 12 13:35:01: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #3 attempt 1 of 0 Oct 12 13:35:01: | sending 476 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #3) Oct 12 13:35:01: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:35:01: | 08 10 20 01 fb 4a ee 71 00 00 01 dc 6b 30 2c 54 Oct 12 13:35:01: | bc 92 21 42 9f e4 8c d1 60 de 73 08 ae e7 25 54 Oct 12 13:35:01: | 94 ee f1 c4 c4 7e f9 c4 1d 6e f0 5f df 3e 72 f4 Oct 12 13:35:01: | 1c a3 04 73 ab 23 02 76 0d 49 1f 92 82 f0 61 09 Oct 12 13:35:01: | 38 2e a8 09 9f 95 2d 0c 62 d7 b3 65 ef 4e 6b 05 Oct 12 13:35:01: | 17 72 da ba a7 a7 b8 e7 c8 2c a4 00 eb 2d b7 ff Oct 12 13:35:01: | 5d a8 43 ff a2 71 80 76 f8 8b 52 3e 37 b0 e2 dd Oct 12 13:35:01: | 45 c6 33 b0 fc 67 0c 14 ce 66 4b 39 8b 86 5f f8 Oct 12 13:35:01: | 0a ab 7c da 71 7e b8 92 ce 1a 38 43 66 78 78 13 Oct 12 13:35:01: | f0 cf bb ca 6b a2 fd ec 29 44 bf eb e0 35 27 9b Oct 12 13:35:01: | 63 06 71 6b 07 93 24 ea 29 40 7c 5a a9 06 f8 2b Oct 12 13:35:01: | 1c 2e a3 f1 65 62 b4 ae 5f 4c ac b2 79 5c 25 f8 Oct 12 13:35:01: | 93 5f fa f5 af 90 82 8c 6d de a0 e3 4d bb 96 c1 Oct 12 13:35:01: | f6 45 a0 c7 5c 15 61 16 58 55 09 70 2e 6b bf f7 Oct 12 13:35:01: | 09 47 4c 02 e8 6b 58 40 86 a2 8b c9 2a 45 2c d9 Oct 12 13:35:01: | 7a 63 e1 5a a6 09 81 70 6b 82 70 56 ec a6 4e 8e Oct 12 13:35:01: | 4a 34 fc 06 e3 e8 ce 4e 7a b1 19 b7 77 5e 54 c8 Oct 12 13:35:01: | 1d 58 7a 54 4a 76 33 3a b8 40 54 70 8d 9d ea 6e Oct 12 13:35:01: | e8 82 af b8 9c da 41 4c 97 af bc 9b d5 01 82 fc Oct 12 13:35:01: | c5 ba 1c 43 f8 04 c3 ad cf b8 f1 05 6a 44 6e 4a Oct 12 13:35:01: | 31 3d 55 ae fb 40 ca c0 53 2e 32 51 7f 80 8f 6e Oct 12 13:35:01: | bf f1 99 13 a0 d0 71 c4 cd c9 b8 af 77 b1 38 95 Oct 12 13:35:01: | c2 6e 5c f5 40 5a 31 c4 99 f7 bd 0c 83 45 59 bb Oct 12 13:35:01: | 7f c2 88 d5 3b 31 d1 cd c1 5b 08 48 72 e3 35 e3 Oct 12 13:35:01: | 4b 8c 5b 9e a2 9f 84 42 07 25 d4 64 d2 85 3e 4c Oct 12 13:35:01: | 5f 9d b4 fd 5f f1 36 13 2e 34 1d a6 cf f5 53 4a Oct 12 13:35:01: | ca da 4b 9e 98 16 a2 66 21 7b 2b f3 fe 75 f1 32 Oct 12 13:35:01: | 5f 9d 46 8b 53 cb f8 7e 0b 1d 38 71 50 4a 7f 7c Oct 12 13:35:01: | b3 85 c1 ca 44 2d ce b1 7c 0a bc df Oct 12 13:35:01: | event_schedule_ms called for about 8000 ms Oct 12 13:35:01: | event_schedule_tv called for about 8 seconds and change Oct 12 13:35:01: | inserting event EVENT_v1_RETRANSMIT, timeout in 8.000000 seconds for #3 Oct 12 13:35:09: | handling event EVENT_v1_RETRANSMIT for state #3 Oct 12 13:35:09: | processing connection "mytunnel" Oct 12 13:35:09: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #3 attempt 1 of 0 Oct 12 13:35:09: | sending 476 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #3) Oct 12 13:35:09: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:35:09: | 08 10 20 01 fb 4a ee 71 00 00 01 dc 6b 30 2c 54 Oct 12 13:35:09: | bc 92 21 42 9f e4 8c d1 60 de 73 08 ae e7 25 54 Oct 12 13:35:09: | 94 ee f1 c4 c4 7e f9 c4 1d 6e f0 5f df 3e 72 f4 Oct 12 13:35:09: | 1c a3 04 73 ab 23 02 76 0d 49 1f 92 82 f0 61 09 Oct 12 13:35:09: | 38 2e a8 09 9f 95 2d 0c 62 d7 b3 65 ef 4e 6b 05 Oct 12 13:35:09: | 17 72 da ba a7 a7 b8 e7 c8 2c a4 00 eb 2d b7 ff Oct 12 13:35:09: | 5d a8 43 ff a2 71 80 76 f8 8b 52 3e 37 b0 e2 dd Oct 12 13:35:09: | 45 c6 33 b0 fc 67 0c 14 ce 66 4b 39 8b 86 5f f8 Oct 12 13:35:09: | 0a ab 7c da 71 7e b8 92 ce 1a 38 43 66 78 78 13 Oct 12 13:35:09: | f0 cf bb ca 6b a2 fd ec 29 44 bf eb e0 35 27 9b Oct 12 13:35:09: | 63 06 71 6b 07 93 24 ea 29 40 7c 5a a9 06 f8 2b Oct 12 13:35:09: | 1c 2e a3 f1 65 62 b4 ae 5f 4c ac b2 79 5c 25 f8 Oct 12 13:35:09: | 93 5f fa f5 af 90 82 8c 6d de a0 e3 4d bb 96 c1 Oct 12 13:35:09: | f6 45 a0 c7 5c 15 61 16 58 55 09 70 2e 6b bf f7 Oct 12 13:35:09: | 09 47 4c 02 e8 6b 58 40 86 a2 8b c9 2a 45 2c d9 Oct 12 13:35:09: | 7a 63 e1 5a a6 09 81 70 6b 82 70 56 ec a6 4e 8e Oct 12 13:35:09: | 4a 34 fc 06 e3 e8 ce 4e 7a b1 19 b7 77 5e 54 c8 Oct 12 13:35:09: | 1d 58 7a 54 4a 76 33 3a b8 40 54 70 8d 9d ea 6e Oct 12 13:35:09: | e8 82 af b8 9c da 41 4c 97 af bc 9b d5 01 82 fc Oct 12 13:35:09: | c5 ba 1c 43 f8 04 c3 ad cf b8 f1 05 6a 44 6e 4a Oct 12 13:35:09: | 31 3d 55 ae fb 40 ca c0 53 2e 32 51 7f 80 8f 6e Oct 12 13:35:09: | bf f1 99 13 a0 d0 71 c4 cd c9 b8 af 77 b1 38 95 Oct 12 13:35:09: | c2 6e 5c f5 40 5a 31 c4 99 f7 bd 0c 83 45 59 bb Oct 12 13:35:09: | 7f c2 88 d5 3b 31 d1 cd c1 5b 08 48 72 e3 35 e3 Oct 12 13:35:09: | 4b 8c 5b 9e a2 9f 84 42 07 25 d4 64 d2 85 3e 4c Oct 12 13:35:09: | 5f 9d b4 fd 5f f1 36 13 2e 34 1d a6 cf f5 53 4a Oct 12 13:35:09: | ca da 4b 9e 98 16 a2 66 21 7b 2b f3 fe 75 f1 32 Oct 12 13:35:09: | 5f 9d 46 8b 53 cb f8 7e 0b 1d 38 71 50 4a 7f 7c Oct 12 13:35:09: | b3 85 c1 ca 44 2d ce b1 7c 0a bc df Oct 12 13:35:09: | event_schedule_ms called for about 16000 ms Oct 12 13:35:09: | event_schedule_tv called for about 16 seconds and change Oct 12 13:35:09: | inserting event EVENT_v1_RETRANSMIT, timeout in 16.000000 seconds for #3 Oct 12 13:35:21: | handling event EVENT_PENDING_PHASE2 Oct 12 13:35:21: | event_schedule called for 120 seconds Oct 12 13:35:21: | event_schedule_tv called for about 120 seconds and change Oct 12 13:35:21: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000000 seconds Oct 12 13:35:21: | pending review: connection "mytunnel" checked Oct 12 13:35:21: | pending review: connection "v6neighbor-hole-out" has no negotiated policy, skipped Oct 12 13:35:21: | pending review: connection "v6neighbor-hole-in" has no negotiated policy, skipped Oct 12 13:35:21: | handling event EVENT_PENDING_DDNS Oct 12 13:35:21: | event_schedule called for 60 seconds Oct 12 13:35:21: | event_schedule_tv called for about 60 seconds and change Oct 12 13:35:21: | inserting event EVENT_PENDING_DDNS, timeout in 60.000000 seconds Oct 12 13:35:21: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Oct 12 13:35:21: | handling event EVENT_SHUNT_SCAN Oct 12 13:35:21: | event_schedule called for 20 seconds Oct 12 13:35:21: | event_schedule_tv called for about 20 seconds and change Oct 12 13:35:21: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000000 seconds Oct 12 13:35:21: | scanning for shunt eroutes Oct 12 13:35:22: | handling event EVENT_v1_RETRANSMIT for state #2 Oct 12 13:35:22: | processing connection "mytunnel" Oct 12 13:35:22: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #2 attempt 0 of 0 Oct 12 13:35:22: "mytunnel" #2: max number of retransmissions (8) reached STATE_QUICK_R1 Oct 12 13:35:22: "mytunnel" #2: deleting state #2 (STATE_QUICK_R1) Oct 12 13:35:22: | child state #2: STATE_QUICK_R1(authenticated-ipsec) > delete Oct 12 13:35:22: "mytunnel" #2: ESP traffic information: in=0B out=0B Oct 12 13:35:22: | **emit ISAKMP Message: Oct 12 13:35:22: | initiator cookie: Oct 12 13:35:22: | 04 22 d3 32 db bc 3c fa Oct 12 13:35:22: | responder cookie: Oct 12 13:35:22: | 07 d0 f4 df b9 f6 51 13 Oct 12 13:35:22: | next payload type: ISAKMP_NEXT_HASH (0x8) Oct 12 13:35:22: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 12 13:35:22: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 12 13:35:22: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Oct 12 13:35:22: | message ID: cf 64 1b c2 Oct 12 13:35:22: | ***emit ISAKMP Hash Payload: Oct 12 13:35:22: | next payload type: ISAKMP_NEXT_D (0xc) Oct 12 13:35:22: | emitting 20 zero bytes of HASH(1) into ISAKMP Hash Payload Oct 12 13:35:22: | emitting length of ISAKMP Hash Payload: 24 Oct 12 13:35:22: | ***emit ISAKMP Delete Payload: Oct 12 13:35:22: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 12 13:35:22: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 12 13:35:22: | protocol ID: 3 (0x3) Oct 12 13:35:22: | SPI size: 4 (0x4) Oct 12 13:35:22: | number of SPIs: 1 (0x1) Oct 12 13:35:22: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload Oct 12 13:35:22: | delete payload 10 73 0d 1b Oct 12 13:35:22: | emitting length of ISAKMP Delete Payload: 16 Oct 12 13:35:22: | hmac prf: init 0x7f5c1bd32710 Oct 12 13:35:22: | hmac prf: init symkey symkey 0x7f5c1000b990 (length 20) Oct 12 13:35:22: | hmac prf: update Oct 12 13:35:22: | concat_symkey_bytes merge symkey(0x7f5c1000b990) bytes(0x7f5c1b7f6040/44) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:35:22: | symkey: key(0x7f5c1000b990) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:35:22: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:35:22: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:35:22: | bytes: 00 00 00 00 00 00 00 00 00 00 00 00 Oct 12 13:35:22: | concat_symkey_bytes key(0x7f5c1bd30ba0) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:35:22: | xor_symkey_chunk merge symkey(0x7f5c1bd30ba0) bytes(0x7ffdf83708a0/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:35:22: | symkey: key(0x7f5c1bd30ba0) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:35:22: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:35:22: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:35:22: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:35:22: | bytes: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 Oct 12 13:35:22: | xor_symkey_chunk key(0x7f5c10011d00) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:35:22: | hmac prf: update bytes data 0x7ffdf837097c (length 4) Oct 12 13:35:22: | concat_symkey_bytes merge symkey(0x7f5c10011d00) bytes(0x7ffdf837097c/4) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:35:22: | symkey: key(0x7f5c10011d00) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:35:22: | bytes: cf 64 1b c2 Oct 12 13:35:22: | concat_symkey_bytes key(0x7f5c10006f70) length(68) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:35:22: | append_symkey_bytes: free key 0x7f5c10011d00 Oct 12 13:35:22: | hmac prf: update bytes data 0x7ffdf8370b44 (length 16) Oct 12 13:35:22: | concat_symkey_bytes merge symkey(0x7f5c10006f70) bytes(0x7ffdf8370b44/16) - derive(CONCATENATE_BASE_AND_DATA) target(SHA1_KEY_DERIVATION) Oct 12 13:35:22: | symkey: key(0x7f5c10006f70) length(68) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:35:22: | bytes: 00 00 00 10 00 00 00 01 03 04 00 01 10 73 0d 1b Oct 12 13:35:22: | concat_symkey_bytes key(0x7f5c10011d00) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:35:22: | append_symkey_bytes: free key 0x7f5c10006f70 Oct 12 13:35:22: | hmac prf: final Oct 12 13:35:22: | prf inner hash: hash(oakley_sha) symkey(0x7f5c10011d00) to symkey - derive(SHA1_KEY_DERIVATION) Oct 12 13:35:22: | symkey: key(0x7f5c10011d00) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:35:22: | prf inner hash: key(0x7f5c10006f70) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:35:22: | prf inner:: free key 0x7f5c10011d00 Oct 12 13:35:22: | xor_symkey_chunk merge symkey(0x7f5c1bd30ba0) bytes(0x7ffdf8370880/64) - derive(XOR_BASE_AND_DATA) target(CONCATENATE_BASE_AND_DATA) Oct 12 13:35:22: | symkey: key(0x7f5c1bd30ba0) length(64) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:35:22: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:35:22: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:35:22: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:35:22: | bytes: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c Oct 12 13:35:22: | xor_symkey_chunk key(0x7f5c10011d00) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:35:22: | concat: merge symkey(1: 0x7f5c10011d00) symkey(2: 0x7f5c10006f70) - derive(CONCATENATE_BASE_AND_KEY) target(SHA1_KEY_DERIVATION) Oct 12 13:35:22: | symkey 1: key(0x7f5c10011d00) length(64) type/mechanism(CONCATENATE_BASE_AND_DATA 0x00000362) Oct 12 13:35:22: | symkey 2: key(0x7f5c10006f70) length(20) type/mechanism(CONCATENATE_BASE_AND_KEY 0x00000360) Oct 12 13:35:22: | concat: key(0x7f5c1bd32370) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:35:22: | append_symkey_symkey: free key 0x7f5c10011d00 Oct 12 13:35:22: | prf hashed inner:: free key 0x7f5c10006f70 Oct 12 13:35:22: | prf key: free key 0x7f5c1bd30ba0 Oct 12 13:35:22: | prf outer hash hash(oakley_sha) symkey(0x7f5c1bd32370) to bytes Oct 12 13:35:22: | symkey: key(0x7f5c1bd32370) length(84) type/mechanism(SHA1_KEY_DERIVATION 0x00000392) Oct 12 13:35:22: | prf outer hash 54 0c f6 09 fe ef bb 8a 27 23 2e 89 3d 0f 24 12 Oct 12 13:35:22: | prf outer hash 03 64 70 10 Oct 12 13:35:22: | prf outer: free key 0x7f5c1bd32370 Oct 12 13:35:22: | prf final bytes 54 0c f6 09 fe ef bb 8a 27 23 2e 89 3d 0f 24 12 Oct 12 13:35:22: | prf final bytes 03 64 70 10 Oct 12 13:35:22: | HASH(1) computed: Oct 12 13:35:22: | 54 0c f6 09 fe ef bb 8a 27 23 2e 89 3d 0f 24 12 Oct 12 13:35:22: | 03 64 70 10 Oct 12 13:35:22: | last Phase 1 IV: 5d f7 19 b6 f4 28 d6 10 08 84 df ff cf 2d 5b e9 Oct 12 13:35:22: | current Phase 1 IV: 5d f7 19 b6 f4 28 d6 10 08 84 df ff cf 2d 5b e9 Oct 12 13:35:22: | computed Phase 2 IV: Oct 12 13:35:22: | 5a 83 c1 75 73 c5 29 13 10 84 74 00 46 26 22 36 Oct 12 13:35:22: | d0 af dd 1c Oct 12 13:35:22: | encrypting: 0c 00 00 18 54 0c f6 09 fe ef bb 8a 27 23 2e 89 Oct 12 13:35:22: | encrypting: 3d 0f 24 12 03 64 70 10 00 00 00 10 00 00 00 01 Oct 12 13:35:22: | encrypting: 03 04 00 01 10 73 0d 1b Oct 12 13:35:22: | IV: 5a 83 c1 75 73 c5 29 13 10 84 74 00 46 26 22 36 Oct 12 13:35:22: | IV: d0 af dd 1c Oct 12 13:35:22: | unpadded size is: 40 Oct 12 13:35:22: | emitting 8 zero bytes of encryption padding into ISAKMP Message Oct 12 13:35:22: | encrypting 48 using OAKLEY_AES_CBC Oct 12 13:35:22: | NSS ike_alg_nss_cbc: aes - enter Oct 12 13:35:22: | NSS ike_alg_nss_cbc: aes - exit Oct 12 13:35:22: | next IV: 72 e9 ad f0 ef 45 be 18 70 18 2d eb 93 cd cb 95 Oct 12 13:35:22: | no IKEv1 message padding required Oct 12 13:35:22: | emitting length of ISAKMP Message: 76 Oct 12 13:35:22: | sending 76 bytes for delete notify through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #1) Oct 12 13:35:22: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:35:22: | 08 10 05 01 cf 64 1b c2 00 00 00 4c ce e8 3a f1 Oct 12 13:35:22: | 9d b8 aa 8f 22 f3 55 c1 ae ad 36 9a f2 82 81 68 Oct 12 13:35:22: | 10 ef 7b 7f 22 5c 3e fb 55 dd 16 15 72 e9 ad f0 Oct 12 13:35:22: | ef 45 be 18 70 18 2d eb 93 cd cb 95 Oct 12 13:35:22: | state: #2 requesting to delete non existing event Oct 12 13:35:22: | unhashing state object #2 Oct 12 13:35:22: | removing state 0x7f5c1bd2d200 entry 0x7f5c1bd2d868 next 0x7f5c1bd2c648 prev-next 0x7f5c1bd34ce8 from list Oct 12 13:35:22: | updated next state 0x7f5c1bd2bfe0 entry 0x7f5c1bd2c648 next (nil) prev-next 0x7f5c1bd34ce8 Oct 12 13:35:22: | removing state 0x7f5c1bd2d200 entry 0x7f5c1bd2d880 next 0x7f5c1bd2c660 prev-next 0x7f5c1bd34d00 from list Oct 12 13:35:22: | updated next state 0x7f5c1bd2bfe0 entry 0x7f5c1bd2c660 next (nil) prev-next 0x7f5c1bd34d00 Oct 12 13:35:22: | delete esp:4b907758@2001:470:dc8c:1000::28:60 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_hdr_build: Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0x7ffdf8372768 pfkey_ext=0p0x7ffdf83727f0 *pfkey_ext=0p(nil). Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0x7ffdf8372768 pfkey_ext=0p0x7ffdf83727f0 *pfkey_ext=0p0x7f5c1bd216e0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_sa_build: spi=4b907758 replay=0 sa_state=1 auth=0 encrypt=0 flags=0 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:70]:0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:60]:0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: extensions[0] needs 16 bytes Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: extensions[1] needs 24 bytes Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: extensions[5] needs 40 bytes Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: extensions[6] needs 40 bytes Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x7f5c1bd35610 allocated 120 bytes, &(extensions[0])=0p0x7ffdf83727f0 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[5] (type=5) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[6] (type=6) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=4(delete), errno=0, satype=3(ESP), len=15, res=0, seq=12, pid=2077. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 4(delete). Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: remain=13 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=13. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: remain=13 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7f5c1bd35620 with parser pfkey_sa_parse. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=4b907758 replay=0 state=1 auth=0 encrypt=0 flags=0 ref=0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=10. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: remain=10 ext_type=5(source-address) ext_len=5 parsing ext 0p0x7f5c1bd35638 with parser pfkey_address_parse. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=5. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: remain=5 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7f5c1bd35660 with parser pfkey_address_parse. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:35:22: | finish_pfkey_msg: K_SADB_DELETE message 12 for Delete SA esp:4b907758@2001:470:dc8c:1000::28:60 Oct 12 13:35:22: | 02 04 00 03 0f 00 00 00 0c 00 00 00 1d 08 00 00 Oct 12 13:35:22: | 03 00 01 00 4b 90 77 58 00 01 00 00 00 00 00 00 Oct 12 13:35:22: | 00 00 00 00 00 00 00 00 05 00 05 00 00 00 00 00 Oct 12 13:35:22: | 0a 00 00 00 00 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:35:22: | 00 00 00 00 00 28 00 70 00 00 00 00 00 00 00 00 Oct 12 13:35:22: | 05 00 06 00 00 00 00 00 0a 00 00 00 00 00 00 00 Oct 12 13:35:22: | 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 60 Oct 12 13:35:22: | 00 00 00 00 00 00 00 00 Oct 12 13:35:22: | pfkey_get: K_SADB_DELETE message 12 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_extensions_free:Free extension 0 (16) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_extensions_free:Free extension 1 (24) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_extensions_free:Free extension 5 (40) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_extensions_free:Free extension 6 (40) Oct 12 13:35:22: | delete esp:10730d1b@2001:470:dc8c:1000::28:70 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_hdr_build: Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0x7ffdf8372798 pfkey_ext=0p0x7ffdf8372820 *pfkey_ext=0p(nil). Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0x7ffdf8372798 pfkey_ext=0p0x7ffdf8372820 *pfkey_ext=0p0x7f5c1bd326f0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_sa_build: spi=10730d1b replay=0 sa_state=1 auth=0 encrypt=0 flags=0 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:60]:0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: found address family AF_INET6. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: found address=[2001:470:dc8c:1000::28:70]:0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_build: successful created len: 5. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: extensions[0] needs 16 bytes Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: extensions[1] needs 24 bytes Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: extensions[5] needs 40 bytes Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: extensions[6] needs 40 bytes Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x7f5c1bd35610 allocated 120 bytes, &(extensions[0])=0p0x7ffdf8372820 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[5] (type=5) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_build: copying 40 bytes from extensions[6] (type=6) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=4(delete), errno=0, satype=3(ESP), len=15, res=0, seq=13, pid=2077. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 4(delete). Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: remain=13 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=13. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: remain=13 ext_type=1(security-association) ext_len=3 parsing ext 0p0x7f5c1bd35620 with parser pfkey_sa_parse. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=10730d1b replay=0 state=1 auth=0 encrypt=0 flags=0 ref=0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=10. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: remain=10 ext_type=5(source-address) ext_len=5 parsing ext 0p0x7f5c1bd35638 with parser pfkey_address_parse. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:60 proto=0 port=0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=5. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: remain=5 ext_type=6(destination-address) ext_len=5 parsing ext 0p0x7f5c1bd35660 with parser pfkey_address_parse. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=10(AF_INET6) address=2001:470:dc8c:1000::28:70 proto=0 port=0. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_address_parse: successful. Oct 12 13:35:22: | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. Oct 12 13:35:22: | finish_pfkey_msg: K_SADB_DELETE message 13 for Delete SA esp:10730d1b@2001:470:dc8c:1000::28:70 Oct 12 13:35:22: | 02 04 00 03 0f 00 00 00 0d 00 00 00 1d 08 00 00 Oct 12 13:35:22: | 03 00 01 00 10 73 0d 1b 00 01 00 00 00 00 00 00 Oct 12 13:35:22: | 00 00 00 00 00 00 00 00 05 00 05 00 00 00 00 00 Oct 12 13:35:22: | 0a 00 00 00 00 00 00 00 20 01 04 70 dc 8c 10 00 Oct 12 13:35:22: | 00 00 00 00 00 28 00 60 00 00 00 00 00 00 00 00 Oct 12 13:35:22: | 05 00 06 00 00 00 00 00 0a 00 00 00 00 00 00 00 Oct 12 13:35:22: | 20 01 04 70 dc 8c 10 00 00 00 00 00 00 28 00 70 Oct 12 13:35:22: | 00 00 00 00 00 00 00 00 Oct 12 13:35:22: | pfkey_get: K_SADB_DELETE message 13 Oct 12 13:35:22: | pfkey_lib_debug:pfkey_extensions_free:Free extension 0 (16) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_extensions_free:Free extension 1 (24) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_extensions_free:Free extension 5 (40) Oct 12 13:35:22: | pfkey_lib_debug:pfkey_extensions_free:Free extension 6 (40) Oct 12 13:35:22: | child state #2: STATE_QUICK_R1(authenticated-ipsec) > STATE_UNDEFINED(ignore) Oct 12 13:35:22: | ignore states: 0 Oct 12 13:35:22: | half-open-ike states: 0 Oct 12 13:35:22: | open-ike states: 0 Oct 12 13:35:22: | established-anonymous-ike states: 0 Oct 12 13:35:22: | established-authenticated-ike states: 1 Oct 12 13:35:22: | anonymous-ipsec states: 0 Oct 12 13:35:22: | authenticated-ipsec states: 1 Oct 12 13:35:22: | informational states: 0 Oct 12 13:35:22: | unknown states: 0 Oct 12 13:35:22: | category states: 2 count states: 2 Oct 12 13:35:22: | st->st_skeyseed_nss: free key 0x7f5c10007210 Oct 12 13:35:22: | st->st_skey_d_nss: free key 0x7f5c1000a220 Oct 12 13:35:22: | st->st_skey_ai_nss: free key 0x7f5c1000b990 Oct 12 13:35:22: | st->st_skey_ar_nss: free key NULL Oct 12 13:35:22: | st->st_skey_ei_nss: free key 0x7f5c1000d210 Oct 12 13:35:22: | st->st_skey_er_nss: free key NULL Oct 12 13:35:22: | st->st_skey_pi_nss: free key NULL Oct 12 13:35:22: | st->st_skey_pr_nss: free key NULL Oct 12 13:35:22: | st->st_enc_key_nss: free key 0x7f5c1bd25cd0 Oct 12 13:35:25: | handling event EVENT_v1_RETRANSMIT for state #3 Oct 12 13:35:25: | processing connection "mytunnel" Oct 12 13:35:25: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #3 attempt 1 of 0 Oct 12 13:35:25: | sending 476 bytes for EVENT_v1_RETRANSMIT through eth0:500 to 2001:470:dc8c:1000::28:60:500 (using #3) Oct 12 13:35:25: | 04 22 d3 32 db bc 3c fa 07 d0 f4 df b9 f6 51 13 Oct 12 13:35:25: | 08 10 20 01 fb 4a ee 71 00 00 01 dc 6b 30 2c 54 Oct 12 13:35:25: | bc 92 21 42 9f e4 8c d1 60 de 73 08 ae e7 25 54 Oct 12 13:35:25: | 94 ee f1 c4 c4 7e f9 c4 1d 6e f0 5f df 3e 72 f4 Oct 12 13:35:25: | 1c a3 04 73 ab 23 02 76 0d 49 1f 92 82 f0 61 09 Oct 12 13:35:25: | 38 2e a8 09 9f 95 2d 0c 62 d7 b3 65 ef 4e 6b 05 Oct 12 13:35:25: | 17 72 da ba a7 a7 b8 e7 c8 2c a4 00 eb 2d b7 ff Oct 12 13:35:25: | 5d a8 43 ff a2 71 80 76 f8 8b 52 3e 37 b0 e2 dd Oct 12 13:35:25: | 45 c6 33 b0 fc 67 0c 14 ce 66 4b 39 8b 86 5f f8 Oct 12 13:35:25: | 0a ab 7c da 71 7e b8 92 ce 1a 38 43 66 78 78 13 Oct 12 13:35:25: | f0 cf bb ca 6b a2 fd ec 29 44 bf eb e0 35 27 9b Oct 12 13:35:25: | 63 06 71 6b 07 93 24 ea 29 40 7c 5a a9 06 f8 2b Oct 12 13:35:25: | 1c 2e a3 f1 65 62 b4 ae 5f 4c ac b2 79 5c 25 f8 Oct 12 13:35:25: | 93 5f fa f5 af 90 82 8c 6d de a0 e3 4d bb 96 c1 Oct 12 13:35:25: | f6 45 a0 c7 5c 15 61 16 58 55 09 70 2e 6b bf f7 Oct 12 13:35:25: | 09 47 4c 02 e8 6b 58 40 86 a2 8b c9 2a 45 2c d9 Oct 12 13:35:25: | 7a 63 e1 5a a6 09 81 70 6b 82 70 56 ec a6 4e 8e Oct 12 13:35:25: | 4a 34 fc 06 e3 e8 ce 4e 7a b1 19 b7 77 5e 54 c8 Oct 12 13:35:25: | 1d 58 7a 54 4a 76 33 3a b8 40 54 70 8d 9d ea 6e Oct 12 13:35:25: | e8 82 af b8 9c da 41 4c 97 af bc 9b d5 01 82 fc Oct 12 13:35:25: | c5 ba 1c 43 f8 04 c3 ad cf b8 f1 05 6a 44 6e 4a Oct 12 13:35:25: | 31 3d 55 ae fb 40 ca c0 53 2e 32 51 7f 80 8f 6e Oct 12 13:35:25: | bf f1 99 13 a0 d0 71 c4 cd c9 b8 af 77 b1 38 95 Oct 12 13:35:25: | c2 6e 5c f5 40 5a 31 c4 99 f7 bd 0c 83 45 59 bb Oct 12 13:35:25: | 7f c2 88 d5 3b 31 d1 cd c1 5b 08 48 72 e3 35 e3 Oct 12 13:35:25: | 4b 8c 5b 9e a2 9f 84 42 07 25 d4 64 d2 85 3e 4c Oct 12 13:35:25: | 5f 9d b4 fd 5f f1 36 13 2e 34 1d a6 cf f5 53 4a Oct 12 13:35:25: | ca da 4b 9e 98 16 a2 66 21 7b 2b f3 fe 75 f1 32 Oct 12 13:35:25: | 5f 9d 46 8b 53 cb f8 7e 0b 1d 38 71 50 4a 7f 7c Oct 12 13:35:25: | b3 85 c1 ca 44 2d ce b1 7c 0a bc df Oct 12 13:35:25: | event_schedule_ms called for about 32000 ms Oct 12 13:35:25: | event_schedule_tv called for about 32 seconds and change Oct 12 13:35:25: | inserting event EVENT_v1_RETRANSMIT, timeout in 32.000000 seconds for #3 Oct 12 13:35:41: | handling event EVENT_SHUNT_SCAN Oct 12 13:35:41: | event_schedule called for 20 seconds Oct 12 13:35:41: | event_schedule_tv called for about 20 seconds and change Oct 12 13:35:41: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000000 seconds Oct 12 13:35:41: | scanning for shunt eroutes Oct 12 13:35:57: | handling event EVENT_v1_RETRANSMIT for state #3 Oct 12 13:35:57: | processing connection "mytunnel" Oct 12 13:35:57: | handling event EVENT_v1_RETRANSMIT for 2001:470:dc8c:1000::28:60 "mytunnel" #3 attempt 1 of 0 Oct 12 13:35:57: "mytunnel" #3: max number of retransmissions (8) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal Oct 12 13:35:57: "mytunnel" #3: deleting state #3 (STATE_QUICK_I1) Oct 12 13:35:57: | child state #3: STATE_QUICK_I1(authenticated-ipsec) > delete Oct 12 13:35:57: | state: #3 requesting to delete non existing event Oct 12 13:35:57: | unhashing state object #3 Oct 12 13:35:57: | removing state 0x7f5c1bd34680 entry 0x7f5c1bd34ce8 next 0x7f5c1bd2c648 prev-next 0x7f5c1b7ee280 from list Oct 12 13:35:57: | updated next state 0x7f5c1bd2bfe0 entry 0x7f5c1bd2c648 next (nil) prev-next 0x7f5c1b7ee280 Oct 12 13:35:57: | removing state 0x7f5c1bd34680 entry 0x7f5c1bd34d00 next 0x7f5c1bd2c660 prev-next 0x7f5c1b7ee448 from list Oct 12 13:35:57: | updated next state 0x7f5c1bd2bfe0 entry 0x7f5c1bd2c660 next (nil) prev-next 0x7f5c1b7ee448 Oct 12 13:35:57: | child state #3: STATE_QUICK_I1(authenticated-ipsec) > STATE_UNDEFINED(ignore) Oct 12 13:35:57: | ignore states: 0 Oct 12 13:35:57: | half-open-ike states: 0 Oct 12 13:35:57: | open-ike states: 0 Oct 12 13:35:57: | established-anonymous-ike states: 0 Oct 12 13:35:57: | established-authenticated-ike states: 1 Oct 12 13:35:57: | anonymous-ipsec states: 0 Oct 12 13:35:57: | authenticated-ipsec states: 0 Oct 12 13:35:57: | informational states: 0 Oct 12 13:35:57: | unknown states: 0 Oct 12 13:35:57: | category states: 1 count states: 1 Oct 12 13:35:57: | st->st_skeyseed_nss: free key 0x7f5c10007210 Oct 12 13:35:57: | st->st_skey_d_nss: free key 0x7f5c1000a220 Oct 12 13:35:57: | st->st_skey_ai_nss: free key 0x7f5c1000b990 Oct 12 13:35:57: | st->st_skey_ar_nss: free key NULL Oct 12 13:35:57: | st->st_skey_ei_nss: free key 0x7f5c1000d210 Oct 12 13:35:57: | st->st_skey_er_nss: free key NULL Oct 12 13:35:57: | st->st_skey_pi_nss: free key NULL Oct 12 13:35:57: | st->st_skey_pr_nss: free key NULL Oct 12 13:35:57: | st->st_enc_key_nss: free key 0x7f5c1bd25cd0 Oct 12 13:36:01: | handling event EVENT_SHUNT_SCAN Oct 12 13:36:01: | event_schedule called for 20 seconds Oct 12 13:36:01: | event_schedule_tv called for about 20 seconds and change Oct 12 13:36:01: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000000 seconds Oct 12 13:36:01: | scanning for shunt eroutes Oct 12 13:36:21: | handling event EVENT_PENDING_DDNS Oct 12 13:36:21: | event_schedule called for 60 seconds Oct 12 13:36:21: | event_schedule_tv called for about 60 seconds and change Oct 12 13:36:21: | inserting event EVENT_PENDING_DDNS, timeout in 60.000000 seconds Oct 12 13:36:21: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Oct 12 13:36:21: | handling event EVENT_SHUNT_SCAN Oct 12 13:36:21: | event_schedule called for 20 seconds Oct 12 13:36:21: | event_schedule_tv called for about 20 seconds and change Oct 12 13:36:21: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000000 seconds Oct 12 13:36:21: | scanning for shunt eroutes