./certificateselfI2 ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
./certificateselfI2 ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
./certificateselfI2 ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
./certificateselfI2 adjusting ipsec.d to ../samples/rwcert
./certificateselfI2 loading secrets from "../samples/rwcert.secrets"
./certificateselfI2   loaded private key file '../samples/rwcert/private/carolKey.pem' (1679 bytes)
./certificateselfI2 loaded private key for keyid: PPK_RSA:AwEAAbfz1/C529 B6C4 CDF5 97E6 322E A755 1874 D9DC DFBF 74DB
| processing whack message of size: A
| processing whack message of size: A
processing whack msg time: X size: Y
| find_host_pair: looking for me=<none>:500 %any him=<none>:500 any-match
| find_host_pair: concluded with <none>
| found_host_pair_conn (check_connection_end): %any:500 %any/%any:500 -> hp:none
| Added new connection home with policy RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
./certificateselfI2   loading certificate from carolCert.pem
./certificateselfI2   loaded host cert file '../samples/rwcert/certs/carolCert.pem' (1415 bytes)
| certificate is valid
| counting wild cards for C=CA, ST=Ontario, L=Ottawa, O=Xelerance Corporation, OU=Doctor Taylor Plumage, CN=carol.testing.openswan.org, E=mcr@xelerance.com is 0
| counting wild cards for @moon.testing.openswan.org is 0
| orient home checking against if: eth0 (AF_INET:93.184.216.34:500)
| orient home matching on public/private keys: this=no[%address] that=yes[%defaultroute]
|   orient home matched on that having private key
| pick_if looking for port: 500, family: 2
|   considering eth0 93.184.216.34 port: 500, family: 2, best: <none>/0 0
|   picking maching interface for family[2,2]: AF_INET resulted in: 93.184.216.34
|   orient home finished with: 1 [93.184.216.34]
| find_host_pair: looking for me=<invalid>:500 %address him=132.213.238.7:500 exact-match
| find_host_pair: concluded with <none>
| connect_to_host_pair: <invalid>:500 %address 132.213.238.7:500 -> hp:none
| find_ID_host_pair: looking for me=C=CA, ST=Ontario, L=Ottawa, O=Xelerance Corporation, OU=Doctor Taylor Plumage, CN=carol.testing.openswan.org, E=mcr@xelerance.com him=@moon.testing.openswan.org (exact)
|   concluded with <none>
./certificateselfI2 adding connection: "home"
| %any[C=CA, ST=Ontario, L=Ottawa, O=Xelerance Corporation, OU=Doctor Taylor Plumage, CN=carol.testing.openswan.org, E=mcr@xelerance.com]...132.213.238.7[@moon.testing.openswan.org]===10.2.0.0/16
| ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1; policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|   =========== input from pcap file parentR1.pcap ========
|   orient home finished with: 1 [93.184.216.34]
RC=0 "home": %any[C=CA, ST=Ontario, L=Ottawa, O=Xelerance Corporation, OU=Doctor Taylor Plumage, CN=carol.testing.openswan.org, E=mcr@xelerance.com]...132.213.238.7[@moon.testing.openswan.org]===10.2.0.0/16; unrouted; eroute owner: #0
RC=0 "home":     myip=unset; hisip=unset; mycert=carolCert.pem;
RC=0 "home":   CAs: 'C=CA, ST=Ontario, L=Ottawa, O=Xelerance Corporation, OU=Doctor Taylor Plumage, CN=testing.xelerance.com, E=mcr@xelerance.com'...'%any'
RC=0 "home":   ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1
RC=0 "home":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK; prio: 16,0; interface: eth0; kind=CK_PERMANENT
| find_phase1_state: no SA found for conn 'home'
| creating state object #1 at Z
| orient home checking against if: eth0 (AF_INET:93.184.216.34:500)
| orient home matching on public/private keys: this=yes[%defaultroute] that=no[%address]
|   orient home matched on this having private key
| pick_if looking for port: 500, family: 2
|   considering eth0 93.184.216.34 port: 500, family: 2, best: <none>/0 0
|   picking maching interface for family[2,2]: AF_INET resulted in: 93.184.216.34
|   orient home finished with: 1 [93.184.216.34]
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| inserting state object #1 bucket: 4
./certificateselfI2 initiating v2 parent SA
./certificateselfI2 STATE_PARENT_I1: initiate
sending 892 bytes for ikev2_parent_outI1_common through eth0:500 [93.184.216.34:500] to 132.213.238.7:500 (using #1)
|   80 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 03 7c  22 00 01 fc
|   02 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  02 00 00 2c
|   02 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 28  03 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 02  00 00 00 08  04 00 00 0e
|   02 00 00 28  04 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 2c  05 01 00 04
|   03 00 00 0c  01 00 00 0c  80 0e 00 80  03 00 00 08
|   03 00 00 02  03 00 00 08  02 00 00 02  00 00 00 08
|   04 00 00 05  02 00 00 2c  06 01 00 04  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  07 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  08 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  09 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 02  02 00 00 28  0a 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 02
|   02 00 00 2c  0b 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 02  00 00 00 2c
|   0c 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 02  28 00 01 08  00 0e 00 00
|   3d a6 6a 81  e2 92 09 be  18 4f a0 1e  5c ed ea 7c
|   7d 7b 3a 21  3e 15 0d 53  5d 17 6a be  1b c5 70 ab
|   34 47 bc 09  14 7c aa 91  9c 8f 81 dc  1e f9 87 cd
|   6a ec fa f3  a5 9e 37 bc  ac 3d fd e1  32 8e e8 b3
|   fe d3 8b f4  7b 50 34 13  33 7a 93 ea  e9 3c 0e 8b
|   bd 48 18 9c  9e 03 70 f2  55 ce 45 22  9f c7 c9 48
|   43 a3 e2 64  b5 5d 43 38  c8 fe f1 d3  06 43 f0 0a
|   e8 6d 61 8c  60 78 d9 98  d3 1b 3b 5e  f5 a6 e8 2f
|   ef 56 ac b4  33 bd 1e 62  b2 3e 0b 17  af 6c b8 31
|   08 d7 19 5a  7b c4 54 c2  13 47 98 c2  cc d2 16 29
|   75 6c 03 fb  1e 9c 9d 21  0c a1 e6 c2  f3 f2 49 2c
|   f6 06 73 c1  96 1e ce 58  81 01 1c cb  16 dc f9 fc
|   c7 93 08 75  58 16 57 71  69 96 66 b7  a9 81 7f f7
|   37 4d 7c 41  38 62 a6 39  00 81 ca 3d  1d fc f7 b5
|   08 38 d4 34  70 22 6c 21  d2 5b 20 a1  d2 ba 2a d1
|   89 f3 20 79  ce ac 1e c2  ec 7d ae 76  94 40 39 a0
|   29 00 00 14  20 98 9d 37  a8 14 a6 4d  8f f0 7c 08
|   d3 20 e9 e3  29 00 00 1c  00 00 40 04  27 ec f2 2b
|   d5 28 36 92  28 23 8a 58  36 a2 4f d8  ee 6c cd bb
|   2b 00 00 1c  00 00 40 05  cd bc 1b 74  02 d7 5e 4c
|   da 5b cd 1c  a1 08 87 2b  f9 7d c4 c2  00 00 00 10
|   4f 45 70 6c  75 74 6f 75  6e 69 74 30
| #1 complete v2 state transition with STF_OK
./certificateselfI2 transition from state STATE_IKEv2_START to state STATE_PARENT_I1
| v2_state_transition: st is #1; pst is #0; transition_st is #0
./certificateselfI2 STATE_PARENT_I1: sent v2I1, expected v2R1 (msgid: 00000000/4294967295)
| *received 432 bytes from 132.213.238.7:500 on eth0 (port=500)
|   80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   21 20 22 20  00 00 00 00  00 00 01 b0  22 00 00 30
|   00 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  28 00 01 08
|   00 0e 00 00  a5 9a 13 6c  b8 87 48 57  e1 22 6e a0
|   b8 55 c2 00  31 15 65 84  8b f9 dc a4  5f 49 d4 c5
|   f0 98 8e 9b  31 85 6e 27  5a c2 75 09  07 37 05 b5
|   b1 53 18 07  81 e8 1d 07  c6 19 1c de  dc 1f 2c 26
|   d2 0b 59 f9  67 6a ee 3c  e5 fa 72 3f  54 96 1e 7d
|   8e d0 30 08  0b ed 95 b0  65 2f 5c a6  36 7e 92 2d
|   da cb 88 54  e3 97 fa 16  6f 9e 7c a6  0c 43 2f 29
|   be 2c a4 55  68 01 45 bc  56 a9 84 b9  2b 1b bf 9a
|   fc 84 67 5f  d3 04 79 90  b7 fa 89 5b  04 06 d5 9a
|   50 92 16 4b  d6 33 40 be  2a 44 94 74  33 a7 a5 c1
|   1f 88 5b eb  4e d2 bb 94  b9 22 db e3  b6 5a 8c f9
|   d6 43 5d 5e  5d c9 19 b8  c8 81 53 01  95 09 02 7b
|   c0 2a b0 c8  5d 2c 69 78  6c e8 f6 5d  e4 90 43 83
|   fd f7 98 5e  cc 92 5c 79  7b 62 ae 98  db 4f 7f e0
|   68 7c cd 29  69 0a ad a3  e8 37 d7 41  b4 79 b3 a5
|   38 a2 8d a0  69 ff bd aa  ba d5 54 70  40 ab b5 fc
|   26 6d ae ce  29 00 00 14  c6 ba 31 9f  88 5b e7 b7
|   a2 93 85 dc  bb c6 15 84  29 00 00 1c  00 00 40 04
|   d7 66 3f 90  45 db b1 6f  2c 55 f2 25  78 55 db 6a
|   76 d4 bc 8f  2b 00 00 1c  00 00 40 05  e0 69 e5 73
|   67 c1 7d a9  ad 6b b5 4f  b4 a3 19 29  c4 d9 11 09
|   00 00 00 10  4f 45 70 6c  75 74 6f 75  6e 69 74 30
| **parse ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   64 0a 06 43  5c 7c 4b 31
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_SA_INIT
|    flags: ISAKMP_FLAG_RESPONSE
|    message ID:  00 00 00 00
|    length: 432
|  processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34), msgid: 00000000
| I am IKE SA Initiator
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
| v2 state object not found
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| v2 peer and cookies match on #1
| v2 state object #1 (home) found, in STATE_PARENT_I1
| removing state object #1
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
| inserting state object #1 bucket: 5
| state found and its state is:STATE_PARENT_I1 msgid: 00000
| ***parse IKEv2 Security Association Payload:
|    critical bit: none
|    length: 48
| processing payload: ISAKMP_NEXT_v2SA (len=48)
| ***parse IKEv2 Key Exchange Payload:
|    critical bit: none
|    length: 264
|    transform type: 14
| processing payload: ISAKMP_NEXT_v2KE (len=264)
| ***parse IKEv2 Nonce Payload:
|    critical bit: none
|    length: 20
| processing payload: ISAKMP_NEXT_v2Ni (len=20)
| ***parse IKEv2 Notify Payload:
|    critical bit: none
|    length: 28
|    Protocol ID: PROTO_RESERVED
|    SPI size: 0
|    Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP
| processing payload: ISAKMP_NEXT_v2N (len=28)
| ***parse IKEv2 Notify Payload:
|    critical bit: none
|    length: 28
|    Protocol ID: PROTO_RESERVED
|    SPI size: 0
|    Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP
| processing payload: ISAKMP_NEXT_v2N (len=28)
| ***parse IKEv2 Vendor ID Payload:
|    critical bit: none
|    length: 16
| processing payload: ISAKMP_NEXT_v2V (len=16)
| considering state entry: 0
| now proceed with state specific processing using state #0 initiator-V2_init
| nat chunk  80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   84 d5 ee 07  01 f4
| processing v2N_NAT_DETECTION_SOURCE_IP
| received nat-t hash  d7 66 3f 90  45 db b1 6f  2c 55 f2 25  78 55 db 6a
|   76 d4 bc 8f
| calculated nat-t  h  d7 66 3f 90  45 db b1 6f  2c 55 f2 25  78 55 db 6a
|   76 d4 bc 8f
| nat-t payloads for v2N_NAT_DETECTION_SOURCE_IP match: no NAT
| nat chunk  80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   5d b8 d8 22  01 f4
| processing v2N_NAT_DETECTION_DESTINATION_IP
| received nat-t hash  e0 69 e5 73  67 c1 7d a9  ad 6b b5 4f  b4 a3 19 29
|   c4 d9 11 09
| calculated nat-t  h  e0 69 e5 73  67 c1 7d a9  ad 6b b5 4f  b4 a3 19 29
|   c4 d9 11 09
| nat-t payloads for v2N_NAT_DETECTION_DESTINATION_IP match: no NAT
| ikev2 parent inR1: calculating g^{xy} in order to send I2
| ****parse IKEv2 Proposal Substructure Payload:
|    length: 44
|    prop #: 1
|    proto ID: 1
|    spi size: 0
|    # transforms: 4
| *****parse IKEv2 Transform Substructure Payload:
|    length: 12
|    transform type: 1
|    transform ID: 12
| ******parse IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 3
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 2
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 4
|    transform ID: 14
| processor 'initiator-V2_init' returned STF_SUSPEND (2)
| #1 complete v2 state transition with STF_SUSPEND
| ikev2 parent inR1outI2: calculating g^{xy}, sending I2
| ikev2 parent SA details
| ikev2 I 0x8001020304050607 0x640a06435c7c4b31 sha1:0x4ea8e662b07cdd430f6944c6723e4b82d5722418 aes128:0x3f44bf47cafd8150591deb088199fcbf
| ikev2 R 0x8001020304050607 0x640a06435c7c4b31 sha1:0x515b0bd22e6d76b34fdb760aa7bfad80b109b75d aes128:0xbedb67ec7dc3d00cccac42e70cd63bde
| duplicating state object #1
| creating state object #2 at Z
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
| inserting state object #2 bucket: 5
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   64 0a 06 43  5c 7c 4b 31
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_AUTH
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 01
| ***emit IKEv2 Encryption Payload:
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
|    next-payload: ISAKMP_NEXT_v2IDi [@-20=0x23]
| *****emit IKEv2 Identification Payload:
|    critical bit: none
|    id_type: ID_DER_ASN1_DN
| emitting 186 raw bytes of my identity into IKEv2 Identification Payload
| my identity  30 81 b7 31  0b 30 09 06  03 55 04 06  13 02 43 41
|   31 10 30 0e  06 03 55 04  08 0c 07 4f  6e 74 61 72
|   69 6f 31 0f  30 0d 06 03  55 04 07 0c  06 4f 74 74
|   61 77 61 31  1e 30 1c 06  03 55 04 0a  0c 15 58 65
|   6c 65 72 61  6e 63 65 20  43 6f 72 70  6f 72 61 74
|   69 6f 6e 31  1e 30 1c 06  03 55 04 0b  0c 15 44 6f
|   63 74 6f 72  20 54 61 79  6c 6f 72 20  50 6c 75 6d
|   61 67 65 31  23 30 21 06  03 55 04 03  0c 1a 63 61
|   72 6f 6c 2e  74 65 73 74  69 6e 67 2e  6f 70 65 6e
|   73 77 61 6e  2e 6f 72 67  31 20 30 1e  06 09 2a 86
|   48 86 f7 0d  01 09 01 16  11 6d 63 72  40 78 65 6c
|   65 72 61 6e  63 65 2e 63  6f 6d
| idhash calc pi  cc 07 97 44  b4 a3 4e 8a  0d 2f 27 8b  ee 06 6d 07
|   a5 a5 75 2e
| idhash calc I2  09 00 00 00  30 81 b7 31  0b 30 09 06  03 55 04 06
|   13 02 43 41  31 10 30 0e  06 03 55 04  08 0c 07 4f
|   6e 74 61 72  69 6f 31 0f  30 0d 06 03  55 04 07 0c
|   06 4f 74 74  61 77 61 31  1e 30 1c 06  03 55 04 0a
|   0c 15 58 65  6c 65 72 61  6e 63 65 20  43 6f 72 70
|   6f 72 61 74  69 6f 6e 31  1e 30 1c 06  03 55 04 0b
|   0c 15 44 6f  63 74 6f 72  20 54 61 79  6c 6f 72 20
|   50 6c 75 6d  61 67 65 31  23 30 21 06  03 55 04 03
|   0c 1a 63 61  72 6f 6c 2e  74 65 73 74  69 6e 67 2e
|   6f 70 65 6e  73 77 61 6e  2e 6f 72 67  31 20 30 1e
|   06 09 2a 86  48 86 f7 0d  01 09 01 16  11 6d 63 72
|   40 78 65 6c  65 72 61 6e  63 65 2e 63  6f 6d
| emitting length of IKEv2 Identification Payload: 194
| IKEv2 thinking whether to send my certificate:
|  my policy has  RSASIG, the policy is : RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|  sendcert: CERT_ALWAYSSEND and I did not get a certificate request
|  so send cert.
| Thinking about sending a certificate request (CERTREQ)
|   my policy is : RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|  my next payload will not be a certificate request
| I did not send a certificate request (CERTREQ) because
|   no known CA for the other end
| I am sending my certificate
|    next-payload: ISAKMP_NEXT_v2CERT [@0=0x25]
| *****emit IKEv2 Certificate Payload:
|    critical bit: none
|    ikev2 cert encoding: CERT_X509_SIGNATURE
| emitting 1003 raw bytes of CERT into IKEv2 Certificate Payload
| CERT  30 82 03 e7  30 82 02 cf  02 09 00 8c  b2 68 2f b0
|   f4 5a 92 30  0d 06 09 2a  86 48 86 f7  0d 01 01 0b
|   05 00 30 81  b2 31 0b 30  09 06 03 55  04 06 13 02
|   43 41 31 10  30 0e 06 03  55 04 08 0c  07 4f 6e 74
|   61 72 69 6f  31 0f 30 0d  06 03 55 04  07 0c 06 4f
|   74 74 61 77  61 31 1e 30  1c 06 03 55  04 0a 0c 15
|   58 65 6c 65  72 61 6e 63  65 20 43 6f  72 70 6f 72
|   61 74 69 6f  6e 31 1e 30  1c 06 03 55  04 0b 0c 15
|   44 6f 63 74  6f 72 20 54  61 79 6c 6f  72 20 50 6c
|   75 6d 61 67  65 31 1e 30  1c 06 03 55  04 03 0c 15
|   74 65 73 74  69 6e 67 2e  78 65 6c 65  72 61 6e 63
|   65 2e 63 6f  6d 31 20 30  1e 06 09 2a  86 48 86 f7
|   0d 01 09 01  16 11 6d 63  72 40 78 65  6c 65 72 61
|   6e 63 65 2e  63 6f 6d 30  1e 17 0d 31  37 30 31 31
|   36 31 36 33  37 33 39 5a  17 0d 31 39  31 31 30 36
|   31 36 33 37  33 39 5a 30  81 b7 31 0b  30 09 06 03
|   55 04 06 13  02 43 41 31  10 30 0e 06  03 55 04 08
|   0c 07 4f 6e  74 61 72 69  6f 31 0f 30  0d 06 03 55
|   04 07 0c 06  4f 74 74 61  77 61 31 1e  30 1c 06 03
|   55 04 0a 0c  15 58 65 6c  65 72 61 6e  63 65 20 43
|   6f 72 70 6f  72 61 74 69  6f 6e 31 1e  30 1c 06 03
|   55 04 0b 0c  15 44 6f 63  74 6f 72 20  54 61 79 6c
|   6f 72 20 50  6c 75 6d 61  67 65 31 23  30 21 06 03
|   55 04 03 0c  1a 63 61 72  6f 6c 2e 74  65 73 74 69
|   6e 67 2e 6f  70 65 6e 73  77 61 6e 2e  6f 72 67 31
|   20 30 1e 06  09 2a 86 48  86 f7 0d 01  09 01 16 11
|   6d 63 72 40  78 65 6c 65  72 61 6e 63  65 2e 63 6f
|   6d 30 82 01  22 30 0d 06  09 2a 86 48  86 f7 0d 01
|   01 01 05 00  03 82 01 0f  00 30 82 01  0a 02 82 01
|   01 00 b7 f3  d4 37 17 ca  df ec 38 02  e2 d4 86 7f
|   45 cb 8f 6b  99 be e1 f8  92 49 3d b0  55 65 ab 97
|   0d e1 52 37  a2 c0 b7 e0  a0 ba ed 29  a1 97 e2 2f
|   80 b7 cd 99  a2 5d a6 75  b1 17 16 93  be f6 ac 57
|   96 23 f6 bb  47 de c6 a3  f8 98 1b 99  ba cd c4 2c
|   0f 36 10 e2  f4 95 0d 9a  84 08 bc 3b  7a 9a 7e 40
|   cc 05 28 2f  a1 e2 69 13  03 5e d3 45  20 87 9d e0
|   ee 14 fb 77  0f 2d 4a 07  0f 1a a4 24  5a eb 48 20
|   a4 fd 4f a7  bf 1d b1 cd  8d 1b 58 97  0f 59 94 7b
|   29 f2 04 98  8e 0f d0 ea  f5 7a a1 fb  6d b9 e3 14
|   0f d3 51 bf  cc 36 63 be  ab 9d 14 66  50 67 f7 1a
|   53 45 16 68  31 66 7b 42  25 1b 98 96  d9 f1 57 b5
|   5c 08 5a 29  a7 26 ae 62  df df 3e 68  c0 c5 b3 d1
|   ba 11 ca 69  c9 f3 23 3a  bc dc 8c 5f  e5 f4 a3 31
|   39 65 b8 60  9f 58 55 ff  34 61 0d 5d  a9 81 a8 28
|   64 44 b1 e6  b8 21 cd 7b  1c 51 a7 db  36 17 54 b5
|   d2 11 02 03  01 00 01 30  0d 06 09 2a  86 48 86 f7
|   0d 01 01 0b  05 00 03 82  01 01 00 65  0a a6 36 2c
|   ec de 56 ce  31 d0 69 b4  40 3f 3e 24  81 8f 86 1e
|   6d 08 bb 80  f6 0a 3e 62  ea 9e 02 c7  e9 a4 cf 7f
|   7a 8b b4 95  7e d5 bd 67  c8 01 db 5a  d6 ba c7 08
|   68 f2 36 57  57 97 ae 66  5b 54 3a fd  a6 fb ce 89
|   8c 37 4f 33  15 d7 55 9d  06 06 1b 58  00 46 77 f2
|   2a a8 98 dd  4a 51 7d c8  2d 61 71 b6  5c 20 a0 a0
|   78 bf 5e 36  81 06 3a 8b  2c 8f f5 76  3e 95 9b 1f
|   82 a3 61 38  ec 1e 67 a3  17 d6 5a 7e  86 87 e7 c9
|   c0 bb 6e 0c  b3 57 07 4b  e5 f0 d0 a3  1d c7 f4 a8
|   72 d9 23 3b  0d 4e 3d ca  21 50 20 15  77 e4 6c c4
|   bf d5 73 ae  9b ab cd 07  82 14 52 34  eb ae 05 39
|   d6 53 de d1  73 0f 88 46  30 bf d1 a9  d0 96 5e b9
|   e2 58 58 5e  0b 67 88 cf  27 23 eb e9  85 2f 2c 21
|   b0 41 cc f3  25 7f 43 e1  01 c1 4f 59  95 e6 e1 b8
|   b7 33 c2 4f  87 3e f7 bd  2a cd b6 ed  ec f5 c7 80
|   bb e9 d0 26  b9 2a 22 61  41 65 fc
| emitting length of IKEv2 Certificate Payload: 1008
|  payload after AUTH will be ISAKMP_NEXT_v2SA
|    next-payload: ISAKMP_NEXT_v2AUTH [@194=0x27]
| *****emit IKEv2 Authentication Payload:
|    critical bit: none
|    auth method: v2_AUTH_RSA
| emitting 192 zero bytes of fake rsa sig into IKEv2 Authentication Payload
| emitting length of IKEv2 Authentication Payload: 200
| empty esp_info, returning defaults
|    next-payload: ISAKMP_NEXT_v2SA [@1202=0x21]
| *****emit IKEv2 Security Association Payload:
|    critical bit: none
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 1
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 2
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 3
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 4
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| emitting length of IKEv2 Security Association Payload: 156
|    next-payload: ISAKMP_NEXT_v2TSi [@1402=0x2c]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selector
| ipv4 low  5d b8 d8 22
| emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selector
| ipv4 high  5d b8 d8 22
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector Payload: 24
|    next-payload: ISAKMP_NEXT_v2TSr [@1558=0x2d]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selector
| ipv4 low  0a 02 00 00
| emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selector
| ipv4 high  0a 02 ff ff
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector Payload: 24
| emitting 10 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07  08 09
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 1648
| emitting length of ISAKMP Message: 1676
| encrypting as INITIATOR, parent SA #1
| data before encryption:
|   25 00 00 c2  09 00 00 00  30 81 b7 31  0b 30 09 06
|   03 55 04 06  13 02 43 41  31 10 30 0e  06 03 55 04
|   08 0c 07 4f  6e 74 61 72  69 6f 31 0f  30 0d 06 03
|   55 04 07 0c  06 4f 74 74  61 77 61 31  1e 30 1c 06
|   03 55 04 0a  0c 15 58 65  6c 65 72 61  6e 63 65 20
|   43 6f 72 70  6f 72 61 74  69 6f 6e 31  1e 30 1c 06
|   03 55 04 0b  0c 15 44 6f  63 74 6f 72  20 54 61 79
|   6c 6f 72 20  50 6c 75 6d  61 67 65 31  23 30 21 06
|   03 55 04 03  0c 1a 63 61  72 6f 6c 2e  74 65 73 74
|   69 6e 67 2e  6f 70 65 6e  73 77 61 6e  2e 6f 72 67
|   31 20 30 1e  06 09 2a 86  48 86 f7 0d  01 09 01 16
|   11 6d 63 72  40 78 65 6c  65 72 61 6e  63 65 2e 63
|   6f 6d 27 00  03 f0 04 30  82 03 e7 30  82 02 cf 02
|   09 00 8c b2  68 2f b0 f4  5a 92 30 0d  06 09 2a 86
|   48 86 f7 0d  01 01 0b 05  00 30 81 b2  31 0b 30 09
|   06 03 55 04  06 13 02 43  41 31 10 30  0e 06 03 55
|   04 08 0c 07  4f 6e 74 61  72 69 6f 31  0f 30 0d 06
|   03 55 04 07  0c 06 4f 74  74 61 77 61  31 1e 30 1c
|   06 03 55 04  0a 0c 15 58  65 6c 65 72  61 6e 63 65
|   20 43 6f 72  70 6f 72 61  74 69 6f 6e  31 1e 30 1c
|   06 03 55 04  0b 0c 15 44  6f 63 74 6f  72 20 54 61
|   79 6c 6f 72  20 50 6c 75  6d 61 67 65  31 1e 30 1c
|   06 03 55 04  03 0c 15 74  65 73 74 69  6e 67 2e 78
|   65 6c 65 72  61 6e 63 65  2e 63 6f 6d  31 20 30 1e
|   06 09 2a 86  48 86 f7 0d  01 09 01 16  11 6d 63 72
|   40 78 65 6c  65 72 61 6e  63 65 2e 63  6f 6d 30 1e
|   17 0d 31 37  30 31 31 36  31 36 33 37  33 39 5a 17
|   0d 31 39 31  31 30 36 31  36 33 37 33  39 5a 30 81
|   b7 31 0b 30  09 06 03 55  04 06 13 02  43 41 31 10
|   30 0e 06 03  55 04 08 0c  07 4f 6e 74  61 72 69 6f
|   31 0f 30 0d  06 03 55 04  07 0c 06 4f  74 74 61 77
|   61 31 1e 30  1c 06 03 55  04 0a 0c 15  58 65 6c 65
|   72 61 6e 63  65 20 43 6f  72 70 6f 72  61 74 69 6f
|   6e 31 1e 30  1c 06 03 55  04 0b 0c 15  44 6f 63 74
|   6f 72 20 54  61 79 6c 6f  72 20 50 6c  75 6d 61 67
|   65 31 23 30  21 06 03 55  04 03 0c 1a  63 61 72 6f
|   6c 2e 74 65  73 74 69 6e  67 2e 6f 70  65 6e 73 77
|   61 6e 2e 6f  72 67 31 20  30 1e 06 09  2a 86 48 86
|   f7 0d 01 09  01 16 11 6d  63 72 40 78  65 6c 65 72
|   61 6e 63 65  2e 63 6f 6d  30 82 01 22  30 0d 06 09
|   2a 86 48 86  f7 0d 01 01  01 05 00 03  82 01 0f 00
|   30 82 01 0a  02 82 01 01  00 b7 f3 d4  37 17 ca df
|   ec 38 02 e2  d4 86 7f 45  cb 8f 6b 99  be e1 f8 92
|   49 3d b0 55  65 ab 97 0d  e1 52 37 a2  c0 b7 e0 a0
|   ba ed 29 a1  97 e2 2f 80  b7 cd 99 a2  5d a6 75 b1
|   17 16 93 be  f6 ac 57 96  23 f6 bb 47  de c6 a3 f8
|   98 1b 99 ba  cd c4 2c 0f  36 10 e2 f4  95 0d 9a 84
|   08 bc 3b 7a  9a 7e 40 cc  05 28 2f a1  e2 69 13 03
|   5e d3 45 20  87 9d e0 ee  14 fb 77 0f  2d 4a 07 0f
|   1a a4 24 5a  eb 48 20 a4  fd 4f a7 bf  1d b1 cd 8d
|   1b 58 97 0f  59 94 7b 29  f2 04 98 8e  0f d0 ea f5
|   7a a1 fb 6d  b9 e3 14 0f  d3 51 bf cc  36 63 be ab
|   9d 14 66 50  67 f7 1a 53  45 16 68 31  66 7b 42 25
|   1b 98 96 d9  f1 57 b5 5c  08 5a 29 a7  26 ae 62 df
|   df 3e 68 c0  c5 b3 d1 ba  11 ca 69 c9  f3 23 3a bc
|   dc 8c 5f e5  f4 a3 31 39  65 b8 60 9f  58 55 ff 34
|   61 0d 5d a9  81 a8 28 64  44 b1 e6 b8  21 cd 7b 1c
|   51 a7 db 36  17 54 b5 d2  11 02 03 01  00 01 30 0d
|   06 09 2a 86  48 86 f7 0d  01 01 0b 05  00 03 82 01
|   01 00 65 0a  a6 36 2c ec  de 56 ce 31  d0 69 b4 40
|   3f 3e 24 81  8f 86 1e 6d  08 bb 80 f6  0a 3e 62 ea
|   9e 02 c7 e9  a4 cf 7f 7a  8b b4 95 7e  d5 bd 67 c8
|   01 db 5a d6  ba c7 08 68  f2 36 57 57  97 ae 66 5b
|   54 3a fd a6  fb ce 89 8c  37 4f 33 15  d7 55 9d 06
|   06 1b 58 00  46 77 f2 2a  a8 98 dd 4a  51 7d c8 2d
|   61 71 b6 5c  20 a0 a0 78  bf 5e 36 81  06 3a 8b 2c
|   8f f5 76 3e  95 9b 1f 82  a3 61 38 ec  1e 67 a3 17
|   d6 5a 7e 86  87 e7 c9 c0  bb 6e 0c b3  57 07 4b e5
|   f0 d0 a3 1d  c7 f4 a8 72  d9 23 3b 0d  4e 3d ca 21
|   50 20 15 77  e4 6c c4 bf  d5 73 ae 9b  ab cd 07 82
|   14 52 34 eb  ae 05 39 d6  53 de d1 73  0f 88 46 30
|   bf d1 a9 d0  96 5e b9 e2  58 58 5e 0b  67 88 cf 27
|   23 eb e9 85  2f 2c 21 b0  41 cc f3 25  7f 43 e1 01
|   c1 4f 59 95  e6 e1 b8 b7  33 c2 4f 87  3e f7 bd 2a
|   cd b6 ed ec  f5 c7 80 bb  e9 d0 26 b9  2a 22 61 41
|   65 fc 21 00  00 c8 01 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 2c 00  00 9c 02 00
|   00 28 01 03  04 03 12 34  56 78 03 00  00 0c 01 00
|   00 0c 80 0e  00 80 03 00  00 08 03 00  00 02 00 00
|   00 08 05 00  00 00 02 00  00 28 02 03  04 03 12 34
|   56 78 03 00  00 0c 01 00  00 0c 80 0e  00 80 03 00
|   00 08 03 00  00 01 00 00  00 08 05 00  00 00 02 00
|   00 24 03 03  04 03 12 34  56 78 03 00  00 08 01 00
|   00 03 03 00  00 08 03 00  00 02 00 00  00 08 05 00
|   00 00 00 00  00 24 04 03  04 03 12 34  56 78 03 00
|   00 08 01 00  00 03 03 00  00 08 03 00  00 01 00 00
|   00 08 05 00  00 00 2d 00  00 18 01 00  00 00 07 00
|   00 10 00 00  ff ff 5d b8  d8 22 5d b8  d8 22 00 00
|   00 18 01 00  00 00 07 00  00 10 00 00  ff ff 0a 02
|   00 00 0a 02  ff ff 00 01  02 03 04 05  06 07 08 09
| data after encryption:
|   03 ba 20 f0  18 9d 7e 13  ee 5a 39 8e  63 66 32 6f
|   52 f0 44 90  0e 36 ee 93  1f 1a ad a6  3c 05 fd 7a
|   f9 f5 8e a4  a3 22 74 96  33 a0 5f 2c  68 1d 2e 3c
|   46 5a 33 15  9c de 56 5d  e7 09 80 58  c4 0b 82 fb
|   99 c5 25 7c  00 ff a3 55  53 a6 50 d7  33 6c 18 16
|   08 46 c5 26  7d 0b 37 8f  5b 5a 01 48  a2 4d 1a ae
|   ce f5 02 9e  77 57 0a ac  24 13 7d 97  aa 36 50 d7
|   e3 6a c3 07  35 67 91 45  2e ba 54 6e  68 b1 4e 71
|   93 0b d2 57  d8 53 52 82  a5 6f 28 a7  0c 20 16 02
|   54 f9 ac a7  dc 83 e9 c1  87 4f 35 87  de e7 ea 0e
|   cf 45 41 d2  fc 5e e5 e1  67 28 77 be  cd 70 09 cc
|   40 02 ac 9c  75 f2 91 78  09 30 fa 27  eb 49 06 03
|   fa 90 1f ea  4b 33 af ae  3f 18 02 a9  e6 b9 d6 28
|   06 9b 5f 18  0a 11 1c 9b  d3 81 7e 50  69 1f 06 b4
|   62 4c e6 37  bf b9 7f b7  7a a2 57 2c  2c e4 91 aa
|   1b 1b 47 fd  0c fe 01 e1  b6 8c 1e ce  98 04 df bb
|   78 e2 95 9a  8b 61 51 57  c9 03 e0 2a  80 11 c1 71
|   e5 e2 02 d9  1c e3 5b 71  06 c7 b9 bc  62 4c 36 45
|   3c 10 42 4d  5d 69 e9 47  82 51 87 30  e6 bd f9 49
|   e2 e2 d0 e1  07 e1 97 74  a5 b6 a7 93  04 e2 6a 65
|   6f 60 64 a4  26 a5 11 9e  be 89 dc 83  aa 17 cb 36
|   ba 41 c3 b1  0d 5d 4e 58  5e be a2 7a  85 b5 8c 8f
|   6f 26 33 ca  3a 6d f7 48  ff 54 ba 01  02 90 e2 e1
|   28 95 81 ba  98 53 8d f4  b0 d2 62 1d  ea 25 b1 d7
|   c9 30 c5 6b  b6 86 06 d8  ca 9c ca 97  51 6d cf 5c
|   b3 5b e9 26  d8 ad 6e 49  48 d6 9a 58  af 58 2a 7b
|   c5 86 b7 f4  4f 87 27 8d  25 b2 59 33  43 ab 26 ed
|   9b a8 07 13  f2 7b 5e 24  eb 0c 95 23  81 a4 a6 17
|   fe 44 3d e0  c8 1b e4 5d  1e 35 bd bc  61 38 b3 14
|   b9 d1 f3 ea  ad 15 39 5f  40 59 d4 dc  ae 15 f6 c1
|   87 aa 29 6f  e5 37 da b3  02 9c a1 4f  0f e3 1a 2e
|   00 f9 0b 2d  96 85 ec a6  e0 24 1f ee  5b 8a 97 ea
|   42 60 78 3d  40 a4 c6 46  a1 62 98 73  9a 3b 3f 03
|   53 0b a5 2d  a5 46 50 70  d4 d9 57 1f  3f a0 77 87
|   4f f4 43 9c  16 cc c3 e6  f9 19 be 23  69 aa 36 c6
|   7b 70 c7 73  eb ac f5 13  13 08 9e 1b  ef 2b 01 a0
|   56 27 16 09  d1 df d2 72  95 99 85 78  45 9a 38 87
|   46 14 cb b4  a1 dc 9f ed  f5 ca 51 4c  4a aa c2 f3
|   4a 31 1c 74  d3 96 56 e0  33 ea 44 65  1e 92 07 89
|   26 fe 98 dd  0e 89 a2 f6  fd 98 eb 1d  e7 3c c4 86
|   08 fe 18 80  c3 28 c0 35  fe 62 5b 48  46 41 33 be
|   e5 0b 09 26  21 fa 5c e0  56 24 e1 34  2a 40 21 e3
|   93 ab 74 34  e3 cb f5 8e  f9 16 cf 89  f5 a2 dd 71
|   fb 84 57 37  12 99 bf 07  4e 6f 70 ac  07 72 91 aa
|   7e 56 37 d3  2a e2 b4 0d  aa 57 8a b0  60 37 e9 cb
|   81 ea 7b d9  96 88 70 4b  4a 81 40 29  70 0e 18 89
|   9c 71 a7 d5  85 ce 8b 69  43 3b 5e 34  17 ee 12 cc
|   15 19 6c 9f  e8 69 bf ce  7c f9 44 7e  ae f5 64 c5
|   02 86 83 97  80 a1 ea 9b  6b c5 30 70  5b 33 2a 55
|   a2 e2 b1 09  00 7b 72 c9  c0 79 f0 b7  43 37 3f e5
|   22 87 e4 7e  b0 e9 d2 e9  ad 86 4e d9  cf e0 de 8f
|   06 ed 19 45  d0 40 2b 45  ac 98 6b 2a  91 13 4e f2
|   d3 37 2d 27  7e 62 c0 f1  27 af 9b 8d  2e 7c bc 73
|   bb 3f 38 cb  07 ca 06 61  99 ea 3d b8  13 2d 90 6a
|   1e cb 48 e8  22 d7 e4 08  a9 e7 14 63  4a a3 17 77
|   cd 5e 3e 5d  9a 4d 99 2c  28 60 fc 86  34 25 3f 73
|   32 27 af 42  dd bd 99 c0  45 e6 4a 79  6c 8a 80 9b
|   e8 70 d0 cd  37 14 07 61  c6 d5 43 43  b9 06 30 a7
|   f5 97 0a b1  63 ac 6f 0f  eb 26 98 1e  c4 cf 15 ce
|   6e b7 f5 ec  b2 a5 f7 ec  81 eb 40 14  af 59 ad 75
|   13 87 ea f7  c2 4b 31 a8  f8 6c 1a 70  10 03 3e 20
|   4f ec 13 31  ce fa 57 6d  6d 1c 1f 9d  99 34 6c 15
|   6c 8c 93 b2  1d 6d 0a bd  c0 a9 cb a4  4f 47 18 84
|   e0 ef 15 a8  ca 7d 4e 11  e1 07 a5 f2  55 b8 66 d5
|   f4 02 81 8d  de 5f 9c 5b  a1 f1 69 d3  51 1f d6 d9
|   31 c0 14 1c  22 7d 83 eb  22 43 13 00  7b 67 b7 cf
|   a8 e6 22 a8  a6 c1 dc 6a  a4 e4 1a 7f  19 3b 4d 45
|   f6 5d db 7b  8a 0e de b4  ae 37 5e c1  4c 63 61 0a
|   b5 23 fe c3  7c 65 1a 12  b3 f6 3f c3  23 ce e8 84
|   15 3c fe c9  19 bb f3 b3  3b ed 09 a9  9c cc 91 15
|   c4 c5 2a 01  9f 0c 46 ed  b6 3b c5 0a  be 74 b8 3d
|   44 01 74 ba  23 5f ae e5  7a 6a 2c d2  64 99 b0 2c
|   0c d6 79 d8  28 83 b0 8d  69 5a 8b 36  93 12 ca a3
|   6e f4 fe df  92 cb fb 96  6a f1 6c db  94 a1 9b 09
|   ac fa 4a 9c  87 99 7c fc  85 8a c8 69  90 7e 3c a0
|   a7 bb 14 4c  f8 5f 0d 8b  f3 1f b9 a6  a5 49 50 a5
|   64 80 a5 1b  cb b2 e9 15  dd bd d0 8d  67 84 90 06
|   a2 db ea e2  5a f6 45 6a  72 82 5f c1  69 26 69 a4
|   ad c3 b7 03  cd cf 80 4b  c6 0f 8f 84  0e 1f 3c 0a
|   02 7a a2 22  f8 22 00 e7  0a 1d 3f 88  a6 0d 34 6a
|   25 e3 99 16  0b 5f 51 6d  d8 c0 fb e7  6c 80 ae 9c
|   ca 2f b5 64  0f da 66 b0  92 4d dd dc  ce 1d 62 7c
|   29 22 d8 22  0d 63 ee 6f  f8 19 ae 36  9b c4 c8 3c
|   4e 77 a0 bb  2d 40 c0 61  db 3e d5 9b  c8 eb e7 9b
|   16 2f 17 71  c6 90 09 ba  5b bd dc 5f  f1 14 55 72
|   ce 86 b0 6e  46 39 38 dc  01 a1 25 f6  19 2d 33 db
|   fa 83 38 f3  f7 41 13 99  9e f9 e3 77  e1 56 20 e7
|   09 d8 fe 6d  37 77 99 64  96 6c 25 e4  d0 90 80 29
|   0c 51 b4 a1  d4 56 c2 14  bd bf 13 c9  ce ae 11 40
|   7b 28 2c 17  b8 54 10 74  ff 59 b8 e4  08 f2 e2 c0
|   65 1e ed 86  db d9 78 8f  ac 2b 38 b4  65 55 16 f3
|   66 3f fa b6  c9 9b 19 78  7f 29 80 5d  95 b9 3e fb
|   71 b8 5a 26  bc 5b a1 80  22 4d 77 02  fc c4 e8 c7
|   f3 89 14 ad  2a 49 2e a2  83 c4 e3 63  83 58 59 6f
|   18 de 99 cd  f1 ef 46 c6  df 59 c8 a0  6a 56 0b a9
|   41 2e 62 fb  bb 66 01 43  94 85 97 e2  36 1a fb 02
|   3f 7d e0 90  df 38 81 e9  c2 29 51 24  c7 de 50 44
|   8b 08 72 45  08 a4 53 88  a6 17 42 1f  9f 14 70 83
|   f3 70 6c 39  f5 3c f3 4d  e4 05 b6 6d  a1 51 ef 92
|   72 ce 2e b2  cc b3 a7 5c  fa 42 6b b3  02 38 fa 59
|   94 e5 3e 51  2e 5d 6f 4a  71 31 e0 73  78 37 91 d5
| data being hmac:  80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   2e 20 23 08  00 00 00 01  00 00 06 8c  23 00 06 70
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   03 ba 20 f0  18 9d 7e 13  ee 5a 39 8e  63 66 32 6f
|   52 f0 44 90  0e 36 ee 93  1f 1a ad a6  3c 05 fd 7a
|   f9 f5 8e a4  a3 22 74 96  33 a0 5f 2c  68 1d 2e 3c
|   46 5a 33 15  9c de 56 5d  e7 09 80 58  c4 0b 82 fb
|   99 c5 25 7c  00 ff a3 55  53 a6 50 d7  33 6c 18 16
|   08 46 c5 26  7d 0b 37 8f  5b 5a 01 48  a2 4d 1a ae
|   ce f5 02 9e  77 57 0a ac  24 13 7d 97  aa 36 50 d7
|   e3 6a c3 07  35 67 91 45  2e ba 54 6e  68 b1 4e 71
|   93 0b d2 57  d8 53 52 82  a5 6f 28 a7  0c 20 16 02
|   54 f9 ac a7  dc 83 e9 c1  87 4f 35 87  de e7 ea 0e
|   cf 45 41 d2  fc 5e e5 e1  67 28 77 be  cd 70 09 cc
|   40 02 ac 9c  75 f2 91 78  09 30 fa 27  eb 49 06 03
|   fa 90 1f ea  4b 33 af ae  3f 18 02 a9  e6 b9 d6 28
|   06 9b 5f 18  0a 11 1c 9b  d3 81 7e 50  69 1f 06 b4
|   62 4c e6 37  bf b9 7f b7  7a a2 57 2c  2c e4 91 aa
|   1b 1b 47 fd  0c fe 01 e1  b6 8c 1e ce  98 04 df bb
|   78 e2 95 9a  8b 61 51 57  c9 03 e0 2a  80 11 c1 71
|   e5 e2 02 d9  1c e3 5b 71  06 c7 b9 bc  62 4c 36 45
|   3c 10 42 4d  5d 69 e9 47  82 51 87 30  e6 bd f9 49
|   e2 e2 d0 e1  07 e1 97 74  a5 b6 a7 93  04 e2 6a 65
|   6f 60 64 a4  26 a5 11 9e  be 89 dc 83  aa 17 cb 36
|   ba 41 c3 b1  0d 5d 4e 58  5e be a2 7a  85 b5 8c 8f
|   6f 26 33 ca  3a 6d f7 48  ff 54 ba 01  02 90 e2 e1
|   28 95 81 ba  98 53 8d f4  b0 d2 62 1d  ea 25 b1 d7
|   c9 30 c5 6b  b6 86 06 d8  ca 9c ca 97  51 6d cf 5c
|   b3 5b e9 26  d8 ad 6e 49  48 d6 9a 58  af 58 2a 7b
|   c5 86 b7 f4  4f 87 27 8d  25 b2 59 33  43 ab 26 ed
|   9b a8 07 13  f2 7b 5e 24  eb 0c 95 23  81 a4 a6 17
|   fe 44 3d e0  c8 1b e4 5d  1e 35 bd bc  61 38 b3 14
|   b9 d1 f3 ea  ad 15 39 5f  40 59 d4 dc  ae 15 f6 c1
|   87 aa 29 6f  e5 37 da b3  02 9c a1 4f  0f e3 1a 2e
|   00 f9 0b 2d  96 85 ec a6  e0 24 1f ee  5b 8a 97 ea
|   42 60 78 3d  40 a4 c6 46  a1 62 98 73  9a 3b 3f 03
|   53 0b a5 2d  a5 46 50 70  d4 d9 57 1f  3f a0 77 87
|   4f f4 43 9c  16 cc c3 e6  f9 19 be 23  69 aa 36 c6
|   7b 70 c7 73  eb ac f5 13  13 08 9e 1b  ef 2b 01 a0
|   56 27 16 09  d1 df d2 72  95 99 85 78  45 9a 38 87
|   46 14 cb b4  a1 dc 9f ed  f5 ca 51 4c  4a aa c2 f3
|   4a 31 1c 74  d3 96 56 e0  33 ea 44 65  1e 92 07 89
|   26 fe 98 dd  0e 89 a2 f6  fd 98 eb 1d  e7 3c c4 86
|   08 fe 18 80  c3 28 c0 35  fe 62 5b 48  46 41 33 be
|   e5 0b 09 26  21 fa 5c e0  56 24 e1 34  2a 40 21 e3
|   93 ab 74 34  e3 cb f5 8e  f9 16 cf 89  f5 a2 dd 71
|   fb 84 57 37  12 99 bf 07  4e 6f 70 ac  07 72 91 aa
|   7e 56 37 d3  2a e2 b4 0d  aa 57 8a b0  60 37 e9 cb
|   81 ea 7b d9  96 88 70 4b  4a 81 40 29  70 0e 18 89
|   9c 71 a7 d5  85 ce 8b 69  43 3b 5e 34  17 ee 12 cc
|   15 19 6c 9f  e8 69 bf ce  7c f9 44 7e  ae f5 64 c5
|   02 86 83 97  80 a1 ea 9b  6b c5 30 70  5b 33 2a 55
|   a2 e2 b1 09  00 7b 72 c9  c0 79 f0 b7  43 37 3f e5
|   22 87 e4 7e  b0 e9 d2 e9  ad 86 4e d9  cf e0 de 8f
|   06 ed 19 45  d0 40 2b 45  ac 98 6b 2a  91 13 4e f2
|   d3 37 2d 27  7e 62 c0 f1  27 af 9b 8d  2e 7c bc 73
|   bb 3f 38 cb  07 ca 06 61  99 ea 3d b8  13 2d 90 6a
|   1e cb 48 e8  22 d7 e4 08  a9 e7 14 63  4a a3 17 77
|   cd 5e 3e 5d  9a 4d 99 2c  28 60 fc 86  34 25 3f 73
|   32 27 af 42  dd bd 99 c0  45 e6 4a 79  6c 8a 80 9b
|   e8 70 d0 cd  37 14 07 61  c6 d5 43 43  b9 06 30 a7
|   f5 97 0a b1  63 ac 6f 0f  eb 26 98 1e  c4 cf 15 ce
|   6e b7 f5 ec  b2 a5 f7 ec  81 eb 40 14  af 59 ad 75
|   13 87 ea f7  c2 4b 31 a8  f8 6c 1a 70  10 03 3e 20
|   4f ec 13 31  ce fa 57 6d  6d 1c 1f 9d  99 34 6c 15
|   6c 8c 93 b2  1d 6d 0a bd  c0 a9 cb a4  4f 47 18 84
|   e0 ef 15 a8  ca 7d 4e 11  e1 07 a5 f2  55 b8 66 d5
|   f4 02 81 8d  de 5f 9c 5b  a1 f1 69 d3  51 1f d6 d9
|   31 c0 14 1c  22 7d 83 eb  22 43 13 00  7b 67 b7 cf
|   a8 e6 22 a8  a6 c1 dc 6a  a4 e4 1a 7f  19 3b 4d 45
|   f6 5d db 7b  8a 0e de b4  ae 37 5e c1  4c 63 61 0a
|   b5 23 fe c3  7c 65 1a 12  b3 f6 3f c3  23 ce e8 84
|   15 3c fe c9  19 bb f3 b3  3b ed 09 a9  9c cc 91 15
|   c4 c5 2a 01  9f 0c 46 ed  b6 3b c5 0a  be 74 b8 3d
|   44 01 74 ba  23 5f ae e5  7a 6a 2c d2  64 99 b0 2c
|   0c d6 79 d8  28 83 b0 8d  69 5a 8b 36  93 12 ca a3
|   6e f4 fe df  92 cb fb 96  6a f1 6c db  94 a1 9b 09
|   ac fa 4a 9c  87 99 7c fc  85 8a c8 69  90 7e 3c a0
|   a7 bb 14 4c  f8 5f 0d 8b  f3 1f b9 a6  a5 49 50 a5
|   64 80 a5 1b  cb b2 e9 15  dd bd d0 8d  67 84 90 06
|   a2 db ea e2  5a f6 45 6a  72 82 5f c1  69 26 69 a4
|   ad c3 b7 03  cd cf 80 4b  c6 0f 8f 84  0e 1f 3c 0a
|   02 7a a2 22  f8 22 00 e7  0a 1d 3f 88  a6 0d 34 6a
|   25 e3 99 16  0b 5f 51 6d  d8 c0 fb e7  6c 80 ae 9c
|   ca 2f b5 64  0f da 66 b0  92 4d dd dc  ce 1d 62 7c
|   29 22 d8 22  0d 63 ee 6f  f8 19 ae 36  9b c4 c8 3c
|   4e 77 a0 bb  2d 40 c0 61  db 3e d5 9b  c8 eb e7 9b
|   16 2f 17 71  c6 90 09 ba  5b bd dc 5f  f1 14 55 72
|   ce 86 b0 6e  46 39 38 dc  01 a1 25 f6  19 2d 33 db
|   fa 83 38 f3  f7 41 13 99  9e f9 e3 77  e1 56 20 e7
|   09 d8 fe 6d  37 77 99 64  96 6c 25 e4  d0 90 80 29
|   0c 51 b4 a1  d4 56 c2 14  bd bf 13 c9  ce ae 11 40
|   7b 28 2c 17  b8 54 10 74  ff 59 b8 e4  08 f2 e2 c0
|   65 1e ed 86  db d9 78 8f  ac 2b 38 b4  65 55 16 f3
|   66 3f fa b6  c9 9b 19 78  7f 29 80 5d  95 b9 3e fb
|   71 b8 5a 26  bc 5b a1 80  22 4d 77 02  fc c4 e8 c7
|   f3 89 14 ad  2a 49 2e a2  83 c4 e3 63  83 58 59 6f
|   18 de 99 cd  f1 ef 46 c6  df 59 c8 a0  6a 56 0b a9
|   41 2e 62 fb  bb 66 01 43  94 85 97 e2  36 1a fb 02
|   3f 7d e0 90  df 38 81 e9  c2 29 51 24  c7 de 50 44
|   8b 08 72 45  08 a4 53 88  a6 17 42 1f  9f 14 70 83
|   f3 70 6c 39  f5 3c f3 4d  e4 05 b6 6d  a1 51 ef 92
|   72 ce 2e b2  cc b3 a7 5c  fa 42 6b b3  02 38 fa 59
|   94 e5 3e 51  2e 5d 6f 4a  71 31 e0 73  78 37 91 d5
| out calculated auth:
|   ff 14 1a 35  c3 86 d6 93  f9 6d 3a b6
| #2 complete v2 state transition with STF_OK
./certificateselfI2 transition from state STATE_PARENT_I1 to state STATE_PARENT_I2
| v2_state_transition: st is #2; pst is #1; transition_st is #1
./certificateselfI2 STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 oursig=fakesig1 theirsig= cipher=aes_128 integ=sha1_96 prf=oakley_sha group=modp2048} (msgid: 00000000/4294967295)
| sending reply packet to 132.213.238.7:500 (from port 500)
sending 1676 bytes for STATE_PARENT_I1 through eth0:500 [93.184.216.34:500] to 132.213.238.7:500 (using #2)
|   80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   2e 20 23 08  00 00 00 01  00 00 06 8c  23 00 06 70
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   03 ba 20 f0  18 9d 7e 13  ee 5a 39 8e  63 66 32 6f
|   52 f0 44 90  0e 36 ee 93  1f 1a ad a6  3c 05 fd 7a
|   f9 f5 8e a4  a3 22 74 96  33 a0 5f 2c  68 1d 2e 3c
|   46 5a 33 15  9c de 56 5d  e7 09 80 58  c4 0b 82 fb
|   99 c5 25 7c  00 ff a3 55  53 a6 50 d7  33 6c 18 16
|   08 46 c5 26  7d 0b 37 8f  5b 5a 01 48  a2 4d 1a ae
|   ce f5 02 9e  77 57 0a ac  24 13 7d 97  aa 36 50 d7
|   e3 6a c3 07  35 67 91 45  2e ba 54 6e  68 b1 4e 71
|   93 0b d2 57  d8 53 52 82  a5 6f 28 a7  0c 20 16 02
|   54 f9 ac a7  dc 83 e9 c1  87 4f 35 87  de e7 ea 0e
|   cf 45 41 d2  fc 5e e5 e1  67 28 77 be  cd 70 09 cc
|   40 02 ac 9c  75 f2 91 78  09 30 fa 27  eb 49 06 03
|   fa 90 1f ea  4b 33 af ae  3f 18 02 a9  e6 b9 d6 28
|   06 9b 5f 18  0a 11 1c 9b  d3 81 7e 50  69 1f 06 b4
|   62 4c e6 37  bf b9 7f b7  7a a2 57 2c  2c e4 91 aa
|   1b 1b 47 fd  0c fe 01 e1  b6 8c 1e ce  98 04 df bb
|   78 e2 95 9a  8b 61 51 57  c9 03 e0 2a  80 11 c1 71
|   e5 e2 02 d9  1c e3 5b 71  06 c7 b9 bc  62 4c 36 45
|   3c 10 42 4d  5d 69 e9 47  82 51 87 30  e6 bd f9 49
|   e2 e2 d0 e1  07 e1 97 74  a5 b6 a7 93  04 e2 6a 65
|   6f 60 64 a4  26 a5 11 9e  be 89 dc 83  aa 17 cb 36
|   ba 41 c3 b1  0d 5d 4e 58  5e be a2 7a  85 b5 8c 8f
|   6f 26 33 ca  3a 6d f7 48  ff 54 ba 01  02 90 e2 e1
|   28 95 81 ba  98 53 8d f4  b0 d2 62 1d  ea 25 b1 d7
|   c9 30 c5 6b  b6 86 06 d8  ca 9c ca 97  51 6d cf 5c
|   b3 5b e9 26  d8 ad 6e 49  48 d6 9a 58  af 58 2a 7b
|   c5 86 b7 f4  4f 87 27 8d  25 b2 59 33  43 ab 26 ed
|   9b a8 07 13  f2 7b 5e 24  eb 0c 95 23  81 a4 a6 17
|   fe 44 3d e0  c8 1b e4 5d  1e 35 bd bc  61 38 b3 14
|   b9 d1 f3 ea  ad 15 39 5f  40 59 d4 dc  ae 15 f6 c1
|   87 aa 29 6f  e5 37 da b3  02 9c a1 4f  0f e3 1a 2e
|   00 f9 0b 2d  96 85 ec a6  e0 24 1f ee  5b 8a 97 ea
|   42 60 78 3d  40 a4 c6 46  a1 62 98 73  9a 3b 3f 03
|   53 0b a5 2d  a5 46 50 70  d4 d9 57 1f  3f a0 77 87
|   4f f4 43 9c  16 cc c3 e6  f9 19 be 23  69 aa 36 c6
|   7b 70 c7 73  eb ac f5 13  13 08 9e 1b  ef 2b 01 a0
|   56 27 16 09  d1 df d2 72  95 99 85 78  45 9a 38 87
|   46 14 cb b4  a1 dc 9f ed  f5 ca 51 4c  4a aa c2 f3
|   4a 31 1c 74  d3 96 56 e0  33 ea 44 65  1e 92 07 89
|   26 fe 98 dd  0e 89 a2 f6  fd 98 eb 1d  e7 3c c4 86
|   08 fe 18 80  c3 28 c0 35  fe 62 5b 48  46 41 33 be
|   e5 0b 09 26  21 fa 5c e0  56 24 e1 34  2a 40 21 e3
|   93 ab 74 34  e3 cb f5 8e  f9 16 cf 89  f5 a2 dd 71
|   fb 84 57 37  12 99 bf 07  4e 6f 70 ac  07 72 91 aa
|   7e 56 37 d3  2a e2 b4 0d  aa 57 8a b0  60 37 e9 cb
|   81 ea 7b d9  96 88 70 4b  4a 81 40 29  70 0e 18 89
|   9c 71 a7 d5  85 ce 8b 69  43 3b 5e 34  17 ee 12 cc
|   15 19 6c 9f  e8 69 bf ce  7c f9 44 7e  ae f5 64 c5
|   02 86 83 97  80 a1 ea 9b  6b c5 30 70  5b 33 2a 55
|   a2 e2 b1 09  00 7b 72 c9  c0 79 f0 b7  43 37 3f e5
|   22 87 e4 7e  b0 e9 d2 e9  ad 86 4e d9  cf e0 de 8f
|   06 ed 19 45  d0 40 2b 45  ac 98 6b 2a  91 13 4e f2
|   d3 37 2d 27  7e 62 c0 f1  27 af 9b 8d  2e 7c bc 73
|   bb 3f 38 cb  07 ca 06 61  99 ea 3d b8  13 2d 90 6a
|   1e cb 48 e8  22 d7 e4 08  a9 e7 14 63  4a a3 17 77
|   cd 5e 3e 5d  9a 4d 99 2c  28 60 fc 86  34 25 3f 73
|   32 27 af 42  dd bd 99 c0  45 e6 4a 79  6c 8a 80 9b
|   e8 70 d0 cd  37 14 07 61  c6 d5 43 43  b9 06 30 a7
|   f5 97 0a b1  63 ac 6f 0f  eb 26 98 1e  c4 cf 15 ce
|   6e b7 f5 ec  b2 a5 f7 ec  81 eb 40 14  af 59 ad 75
|   13 87 ea f7  c2 4b 31 a8  f8 6c 1a 70  10 03 3e 20
|   4f ec 13 31  ce fa 57 6d  6d 1c 1f 9d  99 34 6c 15
|   6c 8c 93 b2  1d 6d 0a bd  c0 a9 cb a4  4f 47 18 84
|   e0 ef 15 a8  ca 7d 4e 11  e1 07 a5 f2  55 b8 66 d5
|   f4 02 81 8d  de 5f 9c 5b  a1 f1 69 d3  51 1f d6 d9
|   31 c0 14 1c  22 7d 83 eb  22 43 13 00  7b 67 b7 cf
|   a8 e6 22 a8  a6 c1 dc 6a  a4 e4 1a 7f  19 3b 4d 45
|   f6 5d db 7b  8a 0e de b4  ae 37 5e c1  4c 63 61 0a
|   b5 23 fe c3  7c 65 1a 12  b3 f6 3f c3  23 ce e8 84
|   15 3c fe c9  19 bb f3 b3  3b ed 09 a9  9c cc 91 15
|   c4 c5 2a 01  9f 0c 46 ed  b6 3b c5 0a  be 74 b8 3d
|   44 01 74 ba  23 5f ae e5  7a 6a 2c d2  64 99 b0 2c
|   0c d6 79 d8  28 83 b0 8d  69 5a 8b 36  93 12 ca a3
|   6e f4 fe df  92 cb fb 96  6a f1 6c db  94 a1 9b 09
|   ac fa 4a 9c  87 99 7c fc  85 8a c8 69  90 7e 3c a0
|   a7 bb 14 4c  f8 5f 0d 8b  f3 1f b9 a6  a5 49 50 a5
|   64 80 a5 1b  cb b2 e9 15  dd bd d0 8d  67 84 90 06
|   a2 db ea e2  5a f6 45 6a  72 82 5f c1  69 26 69 a4
|   ad c3 b7 03  cd cf 80 4b  c6 0f 8f 84  0e 1f 3c 0a
|   02 7a a2 22  f8 22 00 e7  0a 1d 3f 88  a6 0d 34 6a
|   25 e3 99 16  0b 5f 51 6d  d8 c0 fb e7  6c 80 ae 9c
|   ca 2f b5 64  0f da 66 b0  92 4d dd dc  ce 1d 62 7c
|   29 22 d8 22  0d 63 ee 6f  f8 19 ae 36  9b c4 c8 3c
|   4e 77 a0 bb  2d 40 c0 61  db 3e d5 9b  c8 eb e7 9b
|   16 2f 17 71  c6 90 09 ba  5b bd dc 5f  f1 14 55 72
|   ce 86 b0 6e  46 39 38 dc  01 a1 25 f6  19 2d 33 db
|   fa 83 38 f3  f7 41 13 99  9e f9 e3 77  e1 56 20 e7
|   09 d8 fe 6d  37 77 99 64  96 6c 25 e4  d0 90 80 29
|   0c 51 b4 a1  d4 56 c2 14  bd bf 13 c9  ce ae 11 40
|   7b 28 2c 17  b8 54 10 74  ff 59 b8 e4  08 f2 e2 c0
|   65 1e ed 86  db d9 78 8f  ac 2b 38 b4  65 55 16 f3
|   66 3f fa b6  c9 9b 19 78  7f 29 80 5d  95 b9 3e fb
|   71 b8 5a 26  bc 5b a1 80  22 4d 77 02  fc c4 e8 c7
|   f3 89 14 ad  2a 49 2e a2  83 c4 e3 63  83 58 59 6f
|   18 de 99 cd  f1 ef 46 c6  df 59 c8 a0  6a 56 0b a9
|   41 2e 62 fb  bb 66 01 43  94 85 97 e2  36 1a fb 02
|   3f 7d e0 90  df 38 81 e9  c2 29 51 24  c7 de 50 44
|   8b 08 72 45  08 a4 53 88  a6 17 42 1f  9f 14 70 83
|   f3 70 6c 39  f5 3c f3 4d  e4 05 b6 6d  a1 51 ef 92
|   72 ce 2e b2  cc b3 a7 5c  fa 42 6b b3  02 38 fa 59
|   94 e5 3e 51  2e 5d 6f 4a  71 31 e0 73  78 37 91 d5
|   ff 14 1a 35  c3 86 d6 93  f9 6d 3a b6
./certificateselfI2 deleting connection
| pass 0: considering CHILD SAs to delete
./certificateselfI2 deleting state #2 (STATE_CHILD_C0_KEYING)
| received request to delete child state
| removing state object #2
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
./certificateselfI2 deleting state #1 (STATE_PARENT_I2)
| considering request to delete IKE parent state
| sending IKE SA delete request
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   64 0a 06 43  5c 7c 4b 31
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_INFORMATIONAL
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 02
| ***emit IKEv2 Encryption Payload:
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
| *****emit IKEv2 Delete Payload:
|    critical bit: none
|    protocol ID: 1
|    SPI size: 0
|    number of SPIs: 0
| emitting length of IKEv2 Delete Payload: 8
| emitting 8 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 48
| emitting length of ISAKMP Message: 76
| encrypting as INITIATOR, parent SA #1
| data before encryption:
|   00 00 00 08  01 00 00 00  00 01 02 03  04 05 06 07
| data after encryption:
|   23 56 8c 9a  7c 01 7c 8e  c1 2a 91 9a  c4 da 80 c2
| data being hmac:  80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   2e 20 25 08  00 00 00 02  00 00 00 4c  2a 00 00 30
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   23 56 8c 9a  7c 01 7c 8e  c1 2a 91 9a  c4 da 80 c2
| out calculated auth:
|   5e c0 be 04  65 78 5e 79  df 5f d5 d2
sending 76 bytes for ikev2_delete_out through eth0:500 [93.184.216.34:500] to 132.213.238.7:500 (using #1)
|   80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   2e 20 25 08  00 00 00 02  00 00 00 4c  2a 00 00 30
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   23 56 8c 9a  7c 01 7c 8e  c1 2a 91 9a  c4 da 80 c2
|   5e c0 be 04  65 78 5e 79  df 5f d5 d2
| pass 1: considering PARENT SAs to delete
./certificateselfI2 deleting state #1 (STATE_IKESA_DEL)
| considering request to delete IKE parent state
| now deleting the IKE (or parent) state
| removing state object #1
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
./certificateselfI2 leak: request packet for informational exchange, item size: X
./certificateselfI2 leak: reply packet, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_prop, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: 4 * sa copy attrs array, item size: X
./certificateselfI2 leak: sa copy trans array, item size: X
./certificateselfI2 leak: sa copy prop array, item size: X
./certificateselfI2 leak: sa copy prop conj array, item size: X
./certificateselfI2 leak: sa copy prop_conj, item size: X
./certificateselfI2 leak: saved first received packet, item size: X
./certificateselfI2 leak: st_nr in duplicate_state, item size: X
./certificateselfI2 leak: st_ni in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_pr in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_pi in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_er in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_ei in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_ar in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_ai in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_d in duplicate_state, item size: X
./certificateselfI2 leak: st_skeyseed in duplicate_state, item size: X
./certificateselfI2 leak: st_enc_key in duplicate_state, item size: X
./certificateselfI2 leak: struct state in new_state(), item size: X
./certificateselfI2 leak: calculated skey_prshared secret, item size: X
./certificateselfI2 leak: calculated skey_pishared secret, item size: X
./certificateselfI2 leak: calculated skey_ershared secret, item size: X
./certificateselfI2 leak: calculated skey_eishared secret, item size: X
./certificateselfI2 leak: calculated skey_arshared secret, item size: X
./certificateselfI2 leak: calculated skey_aishared secret, item size: X
./certificateselfI2 leak: calculated skey_dshared secret, item size: X
./certificateselfI2 leak: calculated sharedshared secret, item size: X
./certificateselfI2 leak: ikev2_inR1outI2 KE, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_prop, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: nonce, item size: X
./certificateselfI2 leak: Gr, item size: X
./certificateselfI2 leak: saved first packet, item size: X
./certificateselfI2 leak: sa in main_outI1, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_prop, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: initiator nonce, item size: X
./certificateselfI2 leak: long term secret, item size: X
./certificateselfI2 leak: saved gi value, item size: X
./certificateselfI2 leak: msg_digest, item size: X
./certificateselfI2 leak: ikev2_outI1 KE, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_prop, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: 12 * sa copy attrs array, item size: X
./certificateselfI2 leak: sa copy trans array, item size: X
./certificateselfI2 leak: sa copy prop array, item size: X
./certificateselfI2 leak: sa copy prop conj array, item size: X
./certificateselfI2 leak: sa copy prop_conj, item size: X
./certificateselfI2 leak: struct state in new_state(), item size: X
./certificateselfI2 leak: rfc3110 format of public key [created], item size: X
./certificateselfI2 leak: issuer dn, item size: X
./certificateselfI2 leak: keep id name, item size: X
./certificateselfI2 leak: pubkey entry, item size: X
./certificateselfI2 leak: pubkey, item size: X
./certificateselfI2 leak: certificate filename, item size: X
./certificateselfI2 leak: 2 * id list, item size: X
./certificateselfI2 leak: rfc3110 format of public key [created], item size: X
./certificateselfI2 leak: pubkey, item size: X
./certificateselfI2 leak: secret, item size: X
./certificateselfI2 leak: policies path, item size: X
./certificateselfI2 leak: ocspcerts path, item size: X
./certificateselfI2 leak: aacerts path, item size: X
./certificateselfI2 leak: certs path, item size: X
./certificateselfI2 leak: private path, item size: X
./certificateselfI2 leak: crls path, item size: X
./certificateselfI2 leak: cacert path, item size: X
./certificateselfI2 leak: acert path, item size: X
./certificateselfI2 leak: override ipsec.d, item size: X
./certificateselfI2 leak: 2 * hasher name, item size: X
./certificateselfI2 leak: policies path, item size: X
./certificateselfI2 leak: ocspcerts path, item size: X
./certificateselfI2 leak: aacerts path, item size: X
./certificateselfI2 leak: certs path, item size: X
./certificateselfI2 leak: private path, item size: X
./certificateselfI2 leak: crls path, item size: X
./certificateselfI2 leak: cacert path, item size: X
./certificateselfI2 leak: acert path, item size: X
./certificateselfI2 leak: default conf var_dir, item size: X
./certificateselfI2 leak: default conf conffile, item size: X
./certificateselfI2 leak: default conf ipsecd_dir, item size: X
./certificateselfI2 leak: default conf ipsec_conf_dir, item size: X
./certificateselfI2 leak detective found Z leaks, total size X
