./pickkeyI2 ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
./pickkeyI2 ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
./pickkeyI2 ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
./pickkeyI2 loading secrets from "../../libpluto/samples/twoparker.secrets"
./pickkeyI2 loading secrets from "../../libpluto/samples/parker.secrets"
./pickkeyI2 loaded private key for keyid: PPK_RSA:AQN7wUerV/66A6 7046 BBAB E28F 310E C6C0 80EC 790E F556 2AB9
./pickkeyI2 loading secrets from "../../libpluto/samples/noisyparker.secrets"
./pickkeyI2 loaded private key for keyid: PPK_RSA:AQNU2XZiq/8672 0B7E 2E84 3856 5634 58E2 111A 7E93 4348 86A4
| processing whack message of size: A
| processing whack message of size: A
processing whack msg time: X size: Y
./pickkeyI2 loaded key: 2A3A 92D4 E0FA 5CD7 8DE1 D133 0C62 6985 2B6E D701
| processing whack message of size: A
processing whack msg time: X size: Y
./pickkeyI2 loaded key: 66A6 7046 BBAB E28F 310E C6C0 80EC 790E F556 2AB9
| processing whack message of size: A
processing whack msg time: X size: Y
| Added new connection parker1--jj2 with policy RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init+SAREFTRACK
./pickkeyI2 use keyid: 1:2A3A 92D4 E0FA 5CD7 8DE1 D133 0C62 6985 2B6E D701 / 2:<>
| counting wild cards for @jamesjohnson.emmjay.credil.org is 0
./pickkeyI2 use keyid: 1:66A6 7046 BBAB E28F 310E C6C0 80EC 790E F556 2AB9 / 2:<>
| counting wild cards for @parker01.emmjay.credil.org is 0
| orient parker1--jj2 checking against if: eth0 (AF_INET:192.168.1.1:500)
|     orient matched on IP
| orient parker1--jj2 checking against if: eth0 (AF_INET:192.168.1.1:4500)
| orient parker1--jj2 checking against if: eth0 (AF_INET6:2606:2800:220:1:248:1893:25c8:1946:500)
|   orient parker1--jj2 finished with: 1 [192.168.1.1]
| find_host_pair: looking for me=192.168.1.1:500 %address him=132.213.238.7:500 exact-match
| find_host_pair: concluded with <none>
| connect_to_host_pair: 192.168.1.1:500 %address 132.213.238.7:500 -> hp:none
| find_ID_host_pair: looking for me=@parker01.emmjay.credil.org him=@jamesjohnson.emmjay.credil.org (exact)
|   concluded with <none>
./pickkeyI2 adding connection: "parker1--jj2"
| fd68:c9f9:4157:2:0:1::/96===192.168.1.1[@parker01.emmjay.credil.org]...132.213.238.7[@jamesjohnson.emmjay.credil.org]===fd68:c9f9:4157::/64
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|   =========== input from pcap file parentR1.pcap ========
|   orient parker1--jj2 finished with: 1 [192.168.1.1]
RC=0 "parker1--jj2": fd68:c9f9:4157:2:0:1::/96===192.168.1.1[@parker01.emmjay.credil.org]...132.213.238.7[@jamesjohnson.emmjay.credil.org]===fd68:c9f9:4157::/64; unrouted; eroute owner: #0
RC=0 "parker1--jj2":     myip=unset; hisip=unset;
RC=0 "parker1--jj2":   keys: 1:66A6 7046 BBAB E28F 310E C6C0 80EC 790E F556 2AB9 2:none...
RC=0 "parker1--jj2":        ....1:2A3A 92D4 E0FA 5CD7 8DE1 D133 0C62 6985 2B6E D701 2:none
RC=0 "parker1--jj2":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
RC=0 "parker1--jj2":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init+SAREFTRACK; prio: 64,96; interface: eth0; kind=CK_PERMANENT
| find_phase1_state: no SA found for conn 'parker1--jj2'
| creating state object #1 at Z
| orient parker1--jj2 checking against if: eth0 (AF_INET:192.168.1.1:500)
|     orient matched on IP
| orient parker1--jj2 checking against if: eth0 (AF_INET:192.168.1.1:4500)
| orient parker1--jj2 checking against if: eth0 (AF_INET6:2606:2800:220:1:248:1893:25c8:1946:500)
|   orient parker1--jj2 finished with: 1 [192.168.1.1]
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| inserting state object #1 bucket: 4
./pickkeyI2 initiating v2 parent SA
./pickkeyI2 STATE_PARENT_I1: initiate
sending 892 bytes for ikev2_parent_outI1_common through eth0:500 [192.168.1.1:500] to 132.213.238.7:500 (using #1)
|   80 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 03 7c  22 00 01 fc
|   02 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  02 00 00 2c
|   02 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 28  03 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 02  00 00 00 08  04 00 00 0e
|   02 00 00 28  04 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 2c  05 01 00 04
|   03 00 00 0c  01 00 00 0c  80 0e 00 80  03 00 00 08
|   03 00 00 02  03 00 00 08  02 00 00 02  00 00 00 08
|   04 00 00 05  02 00 00 2c  06 01 00 04  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  07 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  08 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  09 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 02  02 00 00 28  0a 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 02
|   02 00 00 2c  0b 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 02  00 00 00 2c
|   0c 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 02  28 00 01 08  00 0e 00 00
|   45 a7 3f fb  25 20 77 b3  45 0a e4 91  a6 af 49 64
|   99 d7 99 08  e8 86 1f d1  29 c7 68 64  ab 29 c3 fb
|   ad 47 9a d0  6b 35 08 ed  d0 9c 59 fb  e8 b8 1e d8
|   0b a6 83 90  ca 4a 73 f6  5c c1 9f ad  32 57 70 e3
|   65 27 9a 8f  69 2d 52 ec  e1 42 bc db  80 8b 10 6a
|   02 71 fe 15  29 1e fa 8a  e6 21 89 84  d0 dd 72 19
|   09 1c 26 01  c4 3e bb c1  b6 cd ca fc  d6 f7 aa 0d
|   86 62 21 e4  1e 86 8a 74  5b 06 d5 2c  19 27 55 ca
|   bb 5e 1d 20  e0 e3 24 79  9b d9 65 a7  50 57 48 b1
|   5a d0 71 a2  60 ef 14 75  69 dd 14 1a  09 88 6d c3
|   b2 7d f5 18  bd c1 33 1d  b0 7d b6 dc  2b 1e a1 98
|   06 bb aa c4  a4 69 b3 c4  f0 4e 08 f3  ee 73 85 41
|   4f 5a dd d3  55 e1 ec a2  e1 97 fb 2f  f2 b0 6f bc
|   fc 5f 6b c2  3a 32 e6 46  e1 df 42 70  03 1c 0e a9
|   1d cb e0 75  ca dd 45 ad  d7 17 f9 02  ef e0 f9 78
|   d1 1e 82 8f  c2 b7 aa 25  19 6f 2f 08  4d 2b df dc
|   29 00 00 14  80 01 02 03  04 05 06 07  08 09 0a 0b
|   0c 0d 0e 0f  29 00 00 1c  00 00 40 04  ea 59 1e 1b
|   30 a3 e0 94  4c dc 91 5b  b0 95 3c 48  70 73 62 f1
|   2b 00 00 1c  00 00 40 05  cd bc 1b 74  02 d7 5e 4c
|   da 5b cd 1c  a1 08 87 2b  f9 7d c4 c2  00 00 00 10
|   4f 45 70 6c  75 74 6f 75  6e 69 74 30
| #1 complete v2 state transition with STF_OK
./pickkeyI2 transition from state STATE_IKEv2_START to state STATE_PARENT_I1
| v2_state_transition: st is #1; pst is #0; transition_st is #0
./pickkeyI2 STATE_PARENT_I1: sent v2I1, expected v2R1 (msgid: 00000000/4294967295)
| *received 376 bytes from 132.213.238.7:500 on eth0 (port=500)
|   80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   21 20 22 20  00 00 00 00  00 00 01 78  22 00 00 30
|   00 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  28 00 01 08
|   00 0e 00 00  a5 9a 13 6c  b8 87 48 57  e1 22 6e a0
|   b8 55 c2 00  31 15 65 84  8b f9 dc a4  5f 49 d4 c5
|   f0 98 8e 9b  31 85 6e 27  5a c2 75 09  07 37 05 b5
|   b1 53 18 07  81 e8 1d 07  c6 19 1c de  dc 1f 2c 26
|   d2 0b 59 f9  67 6a ee 3c  e5 fa 72 3f  54 96 1e 7d
|   8e d0 30 08  0b ed 95 b0  65 2f 5c a6  36 7e 92 2d
|   da cb 88 54  e3 97 fa 16  6f 9e 7c a6  0c 43 2f 29
|   be 2c a4 55  68 01 45 bc  56 a9 84 b9  2b 1b bf 9a
|   fc 84 67 5f  d3 04 79 90  b7 fa 89 5b  04 06 d5 9a
|   50 92 16 4b  d6 33 40 be  2a 44 94 74  33 a7 a5 c1
|   1f 88 5b eb  4e d2 bb 94  b9 22 db e3  b6 5a 8c f9
|   d6 43 5d 5e  5d c9 19 b8  c8 81 53 01  95 09 02 7b
|   c0 2a b0 c8  5d 2c 69 78  6c e8 f6 5d  e4 90 43 83
|   fd f7 98 5e  cc 92 5c 79  7b 62 ae 98  db 4f 7f e0
|   68 7c cd 29  69 0a ad a3  e8 37 d7 41  b4 79 b3 a5
|   38 a2 8d a0  69 ff bd aa  ba d5 54 70  40 ab b5 fc
|   26 6d ae ce  2b 00 00 14  c6 ba 31 9f  88 5b e7 b7
|   a2 93 85 dc  bb c6 15 84  00 00 00 10  4f 45 70 6c
|   75 74 6f 75  6e 69 74 30
| **parse ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   de bc 58 3a  8f 40 d0 cf
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_SA_INIT
|    flags: ISAKMP_FLAG_RESPONSE
|    message ID:  00 00 00 00
|    length: 376
|  processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34), msgid: 00000000
| I am IKE SA Initiator
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
| v2 state object not found
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| v2 peer and cookies match on #1
| v2 state object #1 (parker1--jj2) found, in STATE_PARENT_I1
| removing state object #1
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
| inserting state object #1 bucket: 28
| state found and its state is:STATE_PARENT_I1 msgid: 00000
| ***parse IKEv2 Security Association Payload:
|    critical bit: none
|    length: 48
| processing payload: ISAKMP_NEXT_v2SA (len=48)
| ***parse IKEv2 Key Exchange Payload:
|    critical bit: none
|    length: 264
|    transform type: 14
| processing payload: ISAKMP_NEXT_v2KE (len=264)
| ***parse IKEv2 Nonce Payload:
|    critical bit: none
|    length: 20
| processing payload: ISAKMP_NEXT_v2Ni (len=20)
| ***parse IKEv2 Vendor ID Payload:
|    critical bit: none
|    length: 16
| processing payload: ISAKMP_NEXT_v2V (len=16)
| considering state entry: 0
| now proceed with state specific processing using state #0 initiator-V2_init
| ikev2 parent inR1: calculating g^{xy} in order to send I2
| ****parse IKEv2 Proposal Substructure Payload:
|    length: 44
|    prop #: 1
|    proto ID: 1
|    spi size: 0
|    # transforms: 4
| *****parse IKEv2 Transform Substructure Payload:
|    length: 12
|    transform type: 1
|    transform ID: 12
| ******parse IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 3
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 2
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 4
|    transform ID: 14
| processor 'initiator-V2_init' returned STF_SUSPEND (2)
| #1 complete v2 state transition with STF_SUSPEND
| ikev2 parent inR1outI2: calculating g^{xy}, sending I2
| ikev2 parent SA details
| ikev2 I 0x8001020304050607 0xdebc583a8f40d0cf sha1:0x4ea8e662b07cdd430f6944c6723e4b82d5722418 aes128:0x3f44bf47cafd8150591deb088199fcbf
| ikev2 R 0x8001020304050607 0xdebc583a8f40d0cf sha1:0x515b0bd22e6d76b34fdb760aa7bfad80b109b75d aes128:0xbedb67ec7dc3d00cccac42e70cd63bde
| duplicating state object #1
| creating state object #2 at Z
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
| inserting state object #2 bucket: 28
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   de bc 58 3a  8f 40 d0 cf
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_AUTH
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 01
| ***emit IKEv2 Encryption Payload:
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
|    next-payload: ISAKMP_NEXT_v2IDi [@-20=0x23]
| *****emit IKEv2 Identification Payload:
|    critical bit: none
|    id_type: ID_FQDN
| emitting 26 raw bytes of my identity into IKEv2 Identification Payload
| my identity  70 61 72 6b  65 72 30 31  2e 65 6d 6d  6a 61 79 2e
|   63 72 65 64  69 6c 2e 6f  72 67
| idhash calc pi  cc 07 97 44  b4 a3 4e 8a  0d 2f 27 8b  ee 06 6d 07
|   a5 a5 75 2e
| idhash calc I2  02 00 00 00  70 61 72 6b  65 72 30 31  2e 65 6d 6d
|   6a 61 79 2e  63 72 65 64  69 6c 2e 6f  72 67
| emitting length of IKEv2 Identification Payload: 34
| IKEv2 thinking whether to send my certificate:
|  my policy has  RSASIG, the policy is : RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|  sendcert: CERT_SENDIFASKED and I did not get a certificate request
|  so do not send cert.
| I did not send a certificate because I do not have one.
|  payload after AUTH will be ISAKMP_NEXT_v2SA
|    next-payload: ISAKMP_NEXT_v2AUTH [@0=0x27]
| *****emit IKEv2 Authentication Payload:
|    critical bit: none
|    auth method: v2_AUTH_RSA
| started looking for secret for @parker01.emmjay.credil.org->@jamesjohnson.emmjay.credil.org of kind PPK_RSA
| actually looking for secret for @parker01.emmjay.credil.org->@jamesjohnson.emmjay.credil.org of kind PPK_RSA
| line 1: key type PPK_RSA(@parker01.emmjay.credil.org) to type PPK_RSA
| 1: compared key (none) to @parker01.emmjay.credil.org / @jamesjohnson.emmjay.credil.org -> 2
| 2: compared key (none) to @parker01.emmjay.credil.org / @jamesjohnson.emmjay.credil.org -> 2
| line 1: match=2
| best_match 0>2 line=1
| line 1: key type PPK_RSA(@parker01.emmjay.credil.org) to type PPK_RSA
| 1: compared key (none) to @parker01.emmjay.credil.org / @jamesjohnson.emmjay.credil.org -> 2
| 2: compared key (none) to @parker01.emmjay.credil.org / @jamesjohnson.emmjay.credil.org -> 2
| line 1: match=16
| best_match 2>16 line=1
| concluding with best_match=16 lineno=1
| rsa key AQN7wUerV found
| inputs to hash1 (first packet)
|   80 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 03 7c  22 00 01 fc
|   02 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  02 00 00 2c
|   02 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 28  03 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 02  00 00 00 08  04 00 00 0e
|   02 00 00 28  04 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 2c  05 01 00 04
|   03 00 00 0c  01 00 00 0c  80 0e 00 80  03 00 00 08
|   03 00 00 02  03 00 00 08  02 00 00 02  00 00 00 08
|   04 00 00 05  02 00 00 2c  06 01 00 04  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  07 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  08 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  09 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 02  02 00 00 28  0a 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 02
|   02 00 00 2c  0b 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 02  00 00 00 2c
|   0c 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 02  28 00 01 08  00 0e 00 00
|   45 a7 3f fb  25 20 77 b3  45 0a e4 91  a6 af 49 64
|   99 d7 99 08  e8 86 1f d1  29 c7 68 64  ab 29 c3 fb
|   ad 47 9a d0  6b 35 08 ed  d0 9c 59 fb  e8 b8 1e d8
|   0b a6 83 90  ca 4a 73 f6  5c c1 9f ad  32 57 70 e3
|   65 27 9a 8f  69 2d 52 ec  e1 42 bc db  80 8b 10 6a
|   02 71 fe 15  29 1e fa 8a  e6 21 89 84  d0 dd 72 19
|   09 1c 26 01  c4 3e bb c1  b6 cd ca fc  d6 f7 aa 0d
|   86 62 21 e4  1e 86 8a 74  5b 06 d5 2c  19 27 55 ca
|   bb 5e 1d 20  e0 e3 24 79  9b d9 65 a7  50 57 48 b1
|   5a d0 71 a2  60 ef 14 75  69 dd 14 1a  09 88 6d c3
|   b2 7d f5 18  bd c1 33 1d  b0 7d b6 dc  2b 1e a1 98
|   06 bb aa c4  a4 69 b3 c4  f0 4e 08 f3  ee 73 85 41
|   4f 5a dd d3  55 e1 ec a2  e1 97 fb 2f  f2 b0 6f bc
|   fc 5f 6b c2  3a 32 e6 46  e1 df 42 70  03 1c 0e a9
|   1d cb e0 75  ca dd 45 ad  d7 17 f9 02  ef e0 f9 78
|   d1 1e 82 8f  c2 b7 aa 25  19 6f 2f 08  4d 2b df dc
|   29 00 00 14  80 01 02 03  04 05 06 07  08 09 0a 0b
|   0c 0d 0e 0f  29 00 00 1c  00 00 40 04  ea 59 1e 1b
|   30 a3 e0 94  4c dc 91 5b  b0 95 3c 48  70 73 62 f1
|   2b 00 00 1c  00 00 40 05  cd bc 1b 74  02 d7 5e 4c
|   da 5b cd 1c  a1 08 87 2b  f9 7d c4 c2  00 00 00 10
|   4f 45 70 6c  75 74 6f 75  6e 69 74 30
| inputs to hash2 (responder nonce)
|   c6 ba 31 9f  88 5b e7 b7  a2 93 85 dc  bb c6 15 84
| idhash  e8 eb 28 cc  1d ca 2a 2f  1c 4d 28 46  4d de 8c 30
|   3a f7 90 ff
| v2rsa octets  30 21 30 09  06 05 2b 0e  03 02 1a 05  00 04 14 85
|   50 2b 96 b5  c2 2a 32 6a  74 97 4c 48  47 d9 87 d1
|   25 17 19
| signing hash with RSA Key *AQN7wUerV
| emitting 256 raw bytes of rsa signature into IKEv2 Authentication Payload
| rsa signature  05 0c 9e 55  84 27 89 f8  83 8f 2d 07  cf 4f 1a 4e
|   58 6e 43 d1  58 60 8b b0  d5 6b ce a9  5f 58 7e e3
|   4f 1b 74 a4  60 a7 bc 35  b9 3c 76 ee  a5 4f 8b bf
|   d4 dd c9 a5  9d a7 7a 26  57 b7 4a 54  a0 c4 17 fb
|   80 15 f3 e8  57 9d 5b 23  0b c7 0f 86  84 03 24 14
|   f3 36 99 57  e0 16 81 43  d9 2f 6a 44  a2 5d 8f 62
|   2d c7 5b 88  c3 27 28 65  db 5d c6 96  8d 11 ef 8e
|   44 94 c5 67  e1 63 df 6e  26 27 67 9b  eb d9 0c 15
|   9c f5 80 11  a0 04 bf a3  bb 2b 1a 45  e4 d9 09 2f
|   ff 20 f3 db  d5 f3 ff a1  c6 b2 c3 48  25 f3 0b ec
|   b9 86 f9 d9  db 20 b8 63  04 ea e2 21  0a de 96 15
|   d5 e3 80 ec  96 ea b2 32  ba d8 c4 e3  d8 15 fb 00
|   a2 74 09 7c  23 e6 d8 db  5e 99 0c 48  6e ba 2f 69
|   c8 c7 7a 7f  96 86 9a 66  67 11 ad 84  99 04 30 1e
|   73 89 a8 f3  58 a7 69 3a  ed 3a e8 c6  57 10 4a 06
|   31 0c 55 d6  9c 4d 26 0a  31 54 c6 c9  83 39 9b 65
| emitting length of IKEv2 Authentication Payload: 264
| empty esp_info, returning defaults
|    next-payload: ISAKMP_NEXT_v2SA [@34=0x21]
| *****emit IKEv2 Security Association Payload:
|    critical bit: none
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 1
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 2
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 3
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 4
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| emitting length of IKEv2 Security Association Payload: 156
|    next-payload: ISAKMP_NEXT_v2TSi [@298=0x2c]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV6_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 16 raw bytes of ipv6 low into IKEv2 Traffic Selector
| ipv6 low  fd 68 c9 f9  41 57 00 02  00 00 00 01  00 00 00 00
| emitting 16 raw bytes of ipv6 high into IKEv2 Traffic Selector
| ipv6 high  fd 68 c9 f9  41 57 00 02  00 00 00 01  ff ff ff ff
| emitting length of IKEv2 Traffic Selector: 40
| emitting length of IKEv2 Traffic Selector Payload: 48
|    next-payload: ISAKMP_NEXT_v2TSr [@454=0x2d]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV6_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 16 raw bytes of ipv6 low into IKEv2 Traffic Selector
| ipv6 low  fd 68 c9 f9  41 57 00 00  00 00 00 00  00 00 00 00
| emitting 16 raw bytes of ipv6 high into IKEv2 Traffic Selector
| ipv6 high  fd 68 c9 f9  41 57 00 00  ff ff ff ff  ff ff ff ff
| emitting length of IKEv2 Traffic Selector: 40
| emitting length of IKEv2 Traffic Selector Payload: 48
| emitting 10 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07  08 09
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 592
| emitting length of ISAKMP Message: 620
| encrypting as INITIATOR, parent SA #1
| data before encryption:
|   27 00 00 22  02 00 00 00  70 61 72 6b  65 72 30 31
|   2e 65 6d 6d  6a 61 79 2e  63 72 65 64  69 6c 2e 6f
|   72 67 21 00  01 08 01 00  00 00 05 0c  9e 55 84 27
|   89 f8 83 8f  2d 07 cf 4f  1a 4e 58 6e  43 d1 58 60
|   8b b0 d5 6b  ce a9 5f 58  7e e3 4f 1b  74 a4 60 a7
|   bc 35 b9 3c  76 ee a5 4f  8b bf d4 dd  c9 a5 9d a7
|   7a 26 57 b7  4a 54 a0 c4  17 fb 80 15  f3 e8 57 9d
|   5b 23 0b c7  0f 86 84 03  24 14 f3 36  99 57 e0 16
|   81 43 d9 2f  6a 44 a2 5d  8f 62 2d c7  5b 88 c3 27
|   28 65 db 5d  c6 96 8d 11  ef 8e 44 94  c5 67 e1 63
|   df 6e 26 27  67 9b eb d9  0c 15 9c f5  80 11 a0 04
|   bf a3 bb 2b  1a 45 e4 d9  09 2f ff 20  f3 db d5 f3
|   ff a1 c6 b2  c3 48 25 f3  0b ec b9 86  f9 d9 db 20
|   b8 63 04 ea  e2 21 0a de  96 15 d5 e3  80 ec 96 ea
|   b2 32 ba d8  c4 e3 d8 15  fb 00 a2 74  09 7c 23 e6
|   d8 db 5e 99  0c 48 6e ba  2f 69 c8 c7  7a 7f 96 86
|   9a 66 67 11  ad 84 99 04  30 1e 73 89  a8 f3 58 a7
|   69 3a ed 3a  e8 c6 57 10  4a 06 31 0c  55 d6 9c 4d
|   26 0a 31 54  c6 c9 83 39  9b 65 2c 00  00 9c 02 00
|   00 28 01 03  04 03 12 34  56 78 03 00  00 0c 01 00
|   00 0c 80 0e  00 80 03 00  00 08 03 00  00 02 00 00
|   00 08 05 00  00 00 02 00  00 28 02 03  04 03 12 34
|   56 78 03 00  00 0c 01 00  00 0c 80 0e  00 80 03 00
|   00 08 03 00  00 01 00 00  00 08 05 00  00 00 02 00
|   00 24 03 03  04 03 12 34  56 78 03 00  00 08 01 00
|   00 03 03 00  00 08 03 00  00 02 00 00  00 08 05 00
|   00 00 00 00  00 24 04 03  04 03 12 34  56 78 03 00
|   00 08 01 00  00 03 03 00  00 08 03 00  00 01 00 00
|   00 08 05 00  00 00 2d 00  00 30 01 00  00 00 08 00
|   00 28 00 00  ff ff fd 68  c9 f9 41 57  00 02 00 00
|   00 01 00 00  00 00 fd 68  c9 f9 41 57  00 02 00 00
|   00 01 ff ff  ff ff 00 00  00 30 01 00  00 00 08 00
|   00 28 00 00  ff ff fd 68  c9 f9 41 57  00 00 00 00
|   00 00 00 00  00 00 fd 68  c9 f9 41 57  00 00 ff ff
|   ff ff ff ff  ff ff 00 01  02 03 04 05  06 07 08 09
| data after encryption:
|   bc 35 37 b7  f3 29 8d 7f  0e 4a 2b b3  5d 29 2d b7
|   23 65 2e b5  89 be 6c b5  1e a6 e8 51  7b 82 bc 62
|   7b ce 93 40  23 78 df d9  21 f3 17 88  da 5d 92 88
|   69 d0 a6 7b  19 39 af 0b  68 5b c2 11  fe 3e 13 60
|   1b 68 3a 6b  58 61 06 49  46 f2 e7 3e  3b 4e 9f 30
|   0f 2d 6a 10  82 d1 af 04  0a 56 3e 4c  b5 dd c8 08
|   17 e4 83 2d  a7 d4 8e a4  3a b8 7a b7  ab 84 12 10
|   9a 37 e4 7e  cd d7 1c 57  be 29 d4 11  19 e8 c1 df
|   0f 2f bd c3  e5 78 22 67  93 de 0c ab  16 59 f0 df
|   dd 7c 98 e7  ba 4e 32 e5  7b ec 3d 18  ae 1f c2 fa
|   80 5e 91 fe  13 6e 96 8f  6e 13 54 68  02 46 61 ea
|   bc 4b a1 56  47 1f 7f 0c  5a b6 75 d2  ee 77 f8 3e
|   9f 9c aa 30  ac 65 07 ec  92 5e fa c5  a6 90 e6 e5
|   57 0b 06 20  d7 e8 76 88  ab ce 84 fe  51 46 fb 19
|   22 69 01 09  2e 3d 6b 4c  a8 66 18 03  84 72 a1 18
|   3d 56 0d f3  57 ad 0d e2  c6 48 bd ce  62 40 8b 64
|   86 e2 2a d2  be 8c 68 d2  e7 48 e6 22  e4 d4 58 01
|   a7 28 48 a5  8f 2f 64 34  b8 84 c1 6b  f3 af c5 b2
|   53 8e 6d 97  4b 39 8b 16  3d 15 84 49  83 3a 8b 9f
|   6b 26 6f 56  e0 5b 0b 1a  cf f4 2e bb  9e 17 14 ec
|   9e 3b 6e f2  a8 01 f9 a8  aa 91 a8 14  8a 5c 4a 0f
|   e3 2f fc 62  75 3c 14 5b  e0 41 fc a5  9a 7e 4e f0
|   6a 37 4a 25  75 35 b7 b9  e0 37 9d ee  4f 5b 85 1f
|   46 5f 48 92  f7 9f 57 49  ce 14 bf 04  ea 62 d9 7a
|   1f 4b d9 41  13 4d ba 0c  b2 c6 30 3a  75 02 e7 1c
|   76 78 59 f1  66 f3 54 4a  9f 9e 5f 79  91 cb 2d 44
|   6d 66 55 2d  4f 20 89 ae  00 75 34 2c  48 ff aa 30
|   35 77 cf a2  e4 2c 22 cb  80 1e 48 51  62 cc 6f 8f
|   d8 a6 65 ad  0d 62 b0 86  0e 67 a6 2b  c1 54 da 3c
|   39 73 5e be  f1 6e 17 21  68 69 b5 9e  f9 4f 2a c6
|   28 e4 ba b7  f3 07 89 92  e9 07 da 2e  2d af 1c df
|   72 5a 8e cc  3f 1b e0 a8  de e2 dc c7  d0 6e 57 a2
|   5e a4 b4 db  7a 7c a8 10  3b f1 25 56  20 a0 c0 89
|   a0 f7 e6 2c  92 d0 ed 0d  e8 74 1f 43  18 df 29 a2
|   96 fc 3e 1d  1f 3a 79 17  96 31 82 c8  d3 ad 44 b1
| data being hmac:  80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 23 08  00 00 00 01  00 00 02 6c  23 00 02 50
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   bc 35 37 b7  f3 29 8d 7f  0e 4a 2b b3  5d 29 2d b7
|   23 65 2e b5  89 be 6c b5  1e a6 e8 51  7b 82 bc 62
|   7b ce 93 40  23 78 df d9  21 f3 17 88  da 5d 92 88
|   69 d0 a6 7b  19 39 af 0b  68 5b c2 11  fe 3e 13 60
|   1b 68 3a 6b  58 61 06 49  46 f2 e7 3e  3b 4e 9f 30
|   0f 2d 6a 10  82 d1 af 04  0a 56 3e 4c  b5 dd c8 08
|   17 e4 83 2d  a7 d4 8e a4  3a b8 7a b7  ab 84 12 10
|   9a 37 e4 7e  cd d7 1c 57  be 29 d4 11  19 e8 c1 df
|   0f 2f bd c3  e5 78 22 67  93 de 0c ab  16 59 f0 df
|   dd 7c 98 e7  ba 4e 32 e5  7b ec 3d 18  ae 1f c2 fa
|   80 5e 91 fe  13 6e 96 8f  6e 13 54 68  02 46 61 ea
|   bc 4b a1 56  47 1f 7f 0c  5a b6 75 d2  ee 77 f8 3e
|   9f 9c aa 30  ac 65 07 ec  92 5e fa c5  a6 90 e6 e5
|   57 0b 06 20  d7 e8 76 88  ab ce 84 fe  51 46 fb 19
|   22 69 01 09  2e 3d 6b 4c  a8 66 18 03  84 72 a1 18
|   3d 56 0d f3  57 ad 0d e2  c6 48 bd ce  62 40 8b 64
|   86 e2 2a d2  be 8c 68 d2  e7 48 e6 22  e4 d4 58 01
|   a7 28 48 a5  8f 2f 64 34  b8 84 c1 6b  f3 af c5 b2
|   53 8e 6d 97  4b 39 8b 16  3d 15 84 49  83 3a 8b 9f
|   6b 26 6f 56  e0 5b 0b 1a  cf f4 2e bb  9e 17 14 ec
|   9e 3b 6e f2  a8 01 f9 a8  aa 91 a8 14  8a 5c 4a 0f
|   e3 2f fc 62  75 3c 14 5b  e0 41 fc a5  9a 7e 4e f0
|   6a 37 4a 25  75 35 b7 b9  e0 37 9d ee  4f 5b 85 1f
|   46 5f 48 92  f7 9f 57 49  ce 14 bf 04  ea 62 d9 7a
|   1f 4b d9 41  13 4d ba 0c  b2 c6 30 3a  75 02 e7 1c
|   76 78 59 f1  66 f3 54 4a  9f 9e 5f 79  91 cb 2d 44
|   6d 66 55 2d  4f 20 89 ae  00 75 34 2c  48 ff aa 30
|   35 77 cf a2  e4 2c 22 cb  80 1e 48 51  62 cc 6f 8f
|   d8 a6 65 ad  0d 62 b0 86  0e 67 a6 2b  c1 54 da 3c
|   39 73 5e be  f1 6e 17 21  68 69 b5 9e  f9 4f 2a c6
|   28 e4 ba b7  f3 07 89 92  e9 07 da 2e  2d af 1c df
|   72 5a 8e cc  3f 1b e0 a8  de e2 dc c7  d0 6e 57 a2
|   5e a4 b4 db  7a 7c a8 10  3b f1 25 56  20 a0 c0 89
|   a0 f7 e6 2c  92 d0 ed 0d  e8 74 1f 43  18 df 29 a2
|   96 fc 3e 1d  1f 3a 79 17  96 31 82 c8  d3 ad 44 b1
| out calculated auth:
|   e4 73 6a c9  8c 95 57 f8  e5 30 cc ec
| #2 complete v2 state transition with STF_OK
./pickkeyI2 transition from state STATE_PARENT_I1 to state STATE_PARENT_I2
| v2_state_transition: st is #2; pst is #1; transition_st is #1
./pickkeyI2 STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 oursig=AQN7wUerV theirsig= cipher=aes_128 integ=sha1_96 prf=oakley_sha group=modp2048} (msgid: 00000000/4294967295)
| sending reply packet to 132.213.238.7:500 (from port 500)
sending 620 bytes for STATE_PARENT_I1 through eth0:500 [192.168.1.1:500] to 132.213.238.7:500 (using #2)
|   80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 23 08  00 00 00 01  00 00 02 6c  23 00 02 50
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   bc 35 37 b7  f3 29 8d 7f  0e 4a 2b b3  5d 29 2d b7
|   23 65 2e b5  89 be 6c b5  1e a6 e8 51  7b 82 bc 62
|   7b ce 93 40  23 78 df d9  21 f3 17 88  da 5d 92 88
|   69 d0 a6 7b  19 39 af 0b  68 5b c2 11  fe 3e 13 60
|   1b 68 3a 6b  58 61 06 49  46 f2 e7 3e  3b 4e 9f 30
|   0f 2d 6a 10  82 d1 af 04  0a 56 3e 4c  b5 dd c8 08
|   17 e4 83 2d  a7 d4 8e a4  3a b8 7a b7  ab 84 12 10
|   9a 37 e4 7e  cd d7 1c 57  be 29 d4 11  19 e8 c1 df
|   0f 2f bd c3  e5 78 22 67  93 de 0c ab  16 59 f0 df
|   dd 7c 98 e7  ba 4e 32 e5  7b ec 3d 18  ae 1f c2 fa
|   80 5e 91 fe  13 6e 96 8f  6e 13 54 68  02 46 61 ea
|   bc 4b a1 56  47 1f 7f 0c  5a b6 75 d2  ee 77 f8 3e
|   9f 9c aa 30  ac 65 07 ec  92 5e fa c5  a6 90 e6 e5
|   57 0b 06 20  d7 e8 76 88  ab ce 84 fe  51 46 fb 19
|   22 69 01 09  2e 3d 6b 4c  a8 66 18 03  84 72 a1 18
|   3d 56 0d f3  57 ad 0d e2  c6 48 bd ce  62 40 8b 64
|   86 e2 2a d2  be 8c 68 d2  e7 48 e6 22  e4 d4 58 01
|   a7 28 48 a5  8f 2f 64 34  b8 84 c1 6b  f3 af c5 b2
|   53 8e 6d 97  4b 39 8b 16  3d 15 84 49  83 3a 8b 9f
|   6b 26 6f 56  e0 5b 0b 1a  cf f4 2e bb  9e 17 14 ec
|   9e 3b 6e f2  a8 01 f9 a8  aa 91 a8 14  8a 5c 4a 0f
|   e3 2f fc 62  75 3c 14 5b  e0 41 fc a5  9a 7e 4e f0
|   6a 37 4a 25  75 35 b7 b9  e0 37 9d ee  4f 5b 85 1f
|   46 5f 48 92  f7 9f 57 49  ce 14 bf 04  ea 62 d9 7a
|   1f 4b d9 41  13 4d ba 0c  b2 c6 30 3a  75 02 e7 1c
|   76 78 59 f1  66 f3 54 4a  9f 9e 5f 79  91 cb 2d 44
|   6d 66 55 2d  4f 20 89 ae  00 75 34 2c  48 ff aa 30
|   35 77 cf a2  e4 2c 22 cb  80 1e 48 51  62 cc 6f 8f
|   d8 a6 65 ad  0d 62 b0 86  0e 67 a6 2b  c1 54 da 3c
|   39 73 5e be  f1 6e 17 21  68 69 b5 9e  f9 4f 2a c6
|   28 e4 ba b7  f3 07 89 92  e9 07 da 2e  2d af 1c df
|   72 5a 8e cc  3f 1b e0 a8  de e2 dc c7  d0 6e 57 a2
|   5e a4 b4 db  7a 7c a8 10  3b f1 25 56  20 a0 c0 89
|   a0 f7 e6 2c  92 d0 ed 0d  e8 74 1f 43  18 df 29 a2
|   96 fc 3e 1d  1f 3a 79 17  96 31 82 c8  d3 ad 44 b1
|   e4 73 6a c9  8c 95 57 f8  e5 30 cc ec
./pickkeyI2 deleting connection
| pass 0: considering CHILD SAs to delete
./pickkeyI2 deleting state #2 (STATE_CHILD_C0_KEYING)
| received request to delete child state
| removing state object #2
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
./pickkeyI2 deleting state #1 (STATE_PARENT_I2)
| considering request to delete IKE parent state
| sending IKE SA delete request
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   de bc 58 3a  8f 40 d0 cf
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_INFORMATIONAL
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 02
| ***emit IKEv2 Encryption Payload:
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
| *****emit IKEv2 Delete Payload:
|    critical bit: none
|    protocol ID: 1
|    SPI size: 0
|    number of SPIs: 0
| emitting length of IKEv2 Delete Payload: 8
| emitting 8 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 48
| emitting length of ISAKMP Message: 76
| encrypting as INITIATOR, parent SA #1
| data before encryption:
|   00 00 00 08  01 00 00 00  00 01 02 03  04 05 06 07
| data after encryption:
|   23 56 8c 9a  7c 01 7c 8e  c1 2a 91 9a  c4 da 80 c2
| data being hmac:  80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 25 08  00 00 00 02  00 00 00 4c  2a 00 00 30
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   23 56 8c 9a  7c 01 7c 8e  c1 2a 91 9a  c4 da 80 c2
| out calculated auth:
|   16 a3 d4 62  eb 10 ce 81  c3 c9 f3 30
sending 76 bytes for ikev2_delete_out through eth0:500 [192.168.1.1:500] to 132.213.238.7:500 (using #1)
|   80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 25 08  00 00 00 02  00 00 00 4c  2a 00 00 30
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   23 56 8c 9a  7c 01 7c 8e  c1 2a 91 9a  c4 da 80 c2
|   16 a3 d4 62  eb 10 ce 81  c3 c9 f3 30
| pass 1: considering PARENT SAs to delete
./pickkeyI2 deleting state #1 (STATE_IKESA_DEL)
| considering request to delete IKE parent state
| now deleting the IKE (or parent) state
| removing state object #1
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
./pickkeyI2 leak: request packet for informational exchange, item size: X
./pickkeyI2 leak: reply packet, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_prop, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: 4 * sa copy attrs array, item size: X
./pickkeyI2 leak: sa copy trans array, item size: X
./pickkeyI2 leak: sa copy prop array, item size: X
./pickkeyI2 leak: sa copy prop conj array, item size: X
./pickkeyI2 leak: sa copy prop_conj, item size: X
./pickkeyI2 leak: saved first received packet, item size: X
./pickkeyI2 leak: st_nr in duplicate_state, item size: X
./pickkeyI2 leak: st_ni in duplicate_state, item size: X
./pickkeyI2 leak: st_skey_pr in duplicate_state, item size: X
./pickkeyI2 leak: st_skey_pi in duplicate_state, item size: X
./pickkeyI2 leak: st_skey_er in duplicate_state, item size: X
./pickkeyI2 leak: st_skey_ei in duplicate_state, item size: X
./pickkeyI2 leak: st_skey_ar in duplicate_state, item size: X
./pickkeyI2 leak: st_skey_ai in duplicate_state, item size: X
./pickkeyI2 leak: st_skey_d in duplicate_state, item size: X
./pickkeyI2 leak: st_skeyseed in duplicate_state, item size: X
./pickkeyI2 leak: st_enc_key in duplicate_state, item size: X
./pickkeyI2 leak: struct state in new_state(), item size: X
./pickkeyI2 leak: calculated skey_prshared secret, item size: X
./pickkeyI2 leak: calculated skey_pishared secret, item size: X
./pickkeyI2 leak: calculated skey_ershared secret, item size: X
./pickkeyI2 leak: calculated skey_eishared secret, item size: X
./pickkeyI2 leak: calculated skey_arshared secret, item size: X
./pickkeyI2 leak: calculated skey_aishared secret, item size: X
./pickkeyI2 leak: calculated skey_dshared secret, item size: X
./pickkeyI2 leak: calculated sharedshared secret, item size: X
./pickkeyI2 leak: ikev2_inR1outI2 KE, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_prop, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: nonce, item size: X
./pickkeyI2 leak: Gr, item size: X
./pickkeyI2 leak: saved first packet, item size: X
./pickkeyI2 leak: sa in main_outI1, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_prop, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: initiator nonce, item size: X
./pickkeyI2 leak: long term secret, item size: X
./pickkeyI2 leak: saved gi value, item size: X
./pickkeyI2 leak: msg_digest, item size: X
./pickkeyI2 leak: ikev2_outI1 KE, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_prop, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: db_attrs, item size: X
./pickkeyI2 leak: db_v2_trans, item size: X
./pickkeyI2 leak: db_v2_prop_conj, item size: X
./pickkeyI2 leak: 12 * sa copy attrs array, item size: X
./pickkeyI2 leak: sa copy trans array, item size: X
./pickkeyI2 leak: sa copy prop array, item size: X
./pickkeyI2 leak: sa copy prop conj array, item size: X
./pickkeyI2 leak: sa copy prop_conj, item size: X
./pickkeyI2 leak: struct state in new_state(), item size: X
./pickkeyI2 leak: keep id name, item size: X
./pickkeyI2 leak: pubkey entry, item size: X
./pickkeyI2 leak: rfc3110 format of public key, item size: X
./pickkeyI2 leak: pubkey, item size: X
./pickkeyI2 leak: keep id name, item size: X
./pickkeyI2 leak: pubkey entry, item size: X
./pickkeyI2 leak: rfc3110 format of public key, item size: X
./pickkeyI2 leak: pubkey, item size: X
./pickkeyI2 leak: 2 * id list, item size: X
./pickkeyI2 leak: rfc3110 format of public key [created], item size: X
./pickkeyI2 leak: pubkey, item size: X
./pickkeyI2 leak: secret, item size: X
./pickkeyI2 leak: 2 * id list, item size: X
./pickkeyI2 leak: rfc3110 format of public key [created], item size: X
./pickkeyI2 leak: pubkey, item size: X
./pickkeyI2 leak: secret, item size: X
./pickkeyI2 leak: 2 * hasher name, item size: X
./pickkeyI2 leak: policies path, item size: X
./pickkeyI2 leak: ocspcerts path, item size: X
./pickkeyI2 leak: aacerts path, item size: X
./pickkeyI2 leak: certs path, item size: X
./pickkeyI2 leak: private path, item size: X
./pickkeyI2 leak: crls path, item size: X
./pickkeyI2 leak: cacert path, item size: X
./pickkeyI2 leak: acert path, item size: X
./pickkeyI2 leak: default conf var_dir, item size: X
./pickkeyI2 leak: default conf conffile, item size: X
./pickkeyI2 leak: default conf ipsecd_dir, item size: X
./pickkeyI2 leak: default conf ipsec_conf_dir, item size: X
./pickkeyI2 leak detective found Z leaks, total size X
