./davecertI2 ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
./davecertI2 ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
./davecertI2 ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
./davecertI2 adjusting ipsec.d to ../samples/davecert
./davecertI2 loading secrets from "../samples/davecert.secrets"
./davecertI2   loaded private key file '../samples/davecert/private/daveKey.pem' (1679 bytes)
./davecertI2 loaded private key for keyid: PPK_RSA:AwEAAeOoT/75B9 7996 96CB FFE9 9CEA F984 D596 602E 42AE 6535
| processing whack message of size: A
| processing whack message of size: A
processing whack msg time: X size: Y
| find_host_pair: looking for me=<none>:500 %any him=<none>:500 any-match
| find_host_pair: concluded with <none>
| found_host_pair_conn (check_connection_end): %any:500 %any/%any:500 -> hp:none
| Added new connection home with policy RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
./davecertI2   loading certificate from daveCert.pem
./davecertI2   loaded host cert file '../samples/davecert/certs/daveCert.pem' (1379 bytes)
| certificate is valid
| counting wild cards for C=CA, ST=ON, L=Ottawa, O=Xelerance Corporation, OU=Openswan, CN=dave@openswan.org, E=mcr@xelerance.com is 0
| counting wild cards for @moon.strongswan.org is 0
| orient home checking against if: eth0 (AF_INET:0.0.0.0:500)
| orient home matching on public/private keys: this=no[%address] that=yes[%defaultroute]
|   orient home matched on that having private key
| pick_if looking for port: 500, family: 2
|   considering eth0 0.0.0.0 port: 500, family: 2, best: <none>/0 0
|   picking maching interface for family[2,2]: AF_INET resulted in: 0.0.0.0
|   orient home finished with: 1 [0.0.0.0]
| find_host_pair: looking for me=<invalid>:500 %address him=132.213.238.7:500 exact-match
| find_host_pair: concluded with <none>
| connect_to_host_pair: <invalid>:500 %address 132.213.238.7:500 -> hp:none
| find_ID_host_pair: looking for me=C=CA, ST=ON, L=Ottawa, O=Xelerance Corporation, OU=Openswan, CN=dave@openswan.org, E=mcr@xelerance.com him=@moon.strongswan.org (exact)
|   concluded with <none>
./davecertI2 adding connection: "home"
| %any[C=CA, ST=ON, L=Ottawa, O=Xelerance Corporation, OU=Openswan, CN=dave@openswan.org, E=mcr@xelerance.com]...132.213.238.7[@moon.strongswan.org]===10.2.0.0/16
| ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1; policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|   =========== input from pcap file parentR1dave.pcap ========
|   orient home finished with: 1 [0.0.0.0]
RC=0 "home": %any[C=CA, ST=ON, L=Ottawa, O=Xelerance Corporation, OU=Openswan, CN=dave@openswan.org, E=mcr@xelerance.com]...132.213.238.7[@moon.strongswan.org]===10.2.0.0/16; unrouted; eroute owner: #0
RC=0 "home":     myip=unset; hisip=unset; mycert=daveCert.pem;
RC=0 "home":   CAs: 'C=CA, ST=Ontario, L=Ottawa, O=Xelerance Corporation, OU=Doctor Taylor Plumage, CN=testing.xelerance.com, E=mcr@xelerance.com'...'%any'
RC=0 "home":   ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1
RC=0 "home":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK; prio: 16,0; interface: eth0; kind=CK_PERMANENT
| Changed path to directory '../samples/davecert/cacerts'
./davecertI2   loaded CA cert file 'rootCA.pem' (1525 bytes)
| find_phase1_state: no SA found for conn 'home'
| creating state object #1 at Z
| orient home checking against if: eth0 (AF_INET:0.0.0.0:500)
| orient home matching on public/private keys: this=yes[%defaultroute] that=no[%address]
|   orient home matched on this having private key
| pick_if looking for port: 500, family: 2
|   considering eth0 0.0.0.0 port: 500, family: 2, best: <none>/0 0
|   picking maching interface for family[2,2]: AF_INET resulted in: 0.0.0.0
|   orient home finished with: 1 [0.0.0.0]
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| inserting state object #1 bucket: 4
./davecertI2 initiating v2 parent SA
./davecertI2 STATE_PARENT_I1: initiate
sending 892 bytes for ikev2_parent_outI1_common through eth0:500 [93.184.216.35:500] to 132.213.238.7:500 (using #1)
|   8d 0e 0f 10  11 12 13 14  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 03 7c  22 00 01 fc
|   02 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  02 00 00 2c
|   02 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 28  03 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 02  00 00 00 08  04 00 00 0e
|   02 00 00 28  04 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 2c  05 01 00 04
|   03 00 00 0c  01 00 00 0c  80 0e 00 80  03 00 00 08
|   03 00 00 02  03 00 00 08  02 00 00 02  00 00 00 08
|   04 00 00 05  02 00 00 2c  06 01 00 04  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  07 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  08 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  09 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 02  02 00 00 28  0a 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 02
|   02 00 00 2c  0b 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 02  00 00 00 2c
|   0c 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 02  28 00 01 08  00 0e 00 00
|   3d a6 6a 81  e2 92 09 be  18 4f a0 1e  5c ed ea 7c
|   7d 7b 3a 21  3e 15 0d 53  5d 17 6a be  1b c5 70 ab
|   34 47 bc 09  14 7c aa 91  9c 8f 81 dc  1e f9 87 cd
|   6a ec fa f3  a5 9e 37 bc  ac 3d fd e1  32 8e e8 b3
|   fe d3 8b f4  7b 50 34 13  33 7a 93 ea  e9 3c 0e 8b
|   bd 48 18 9c  9e 03 70 f2  55 ce 45 22  9f c7 c9 48
|   43 a3 e2 64  b5 5d 43 38  c8 fe f1 d3  06 43 f0 0a
|   e8 6d 61 8c  60 78 d9 98  d3 1b 3b 5e  f5 a6 e8 2f
|   ef 56 ac b4  33 bd 1e 62  b2 3e 0b 17  af 6c b8 31
|   08 d7 19 5a  7b c4 54 c2  13 47 98 c2  cc d2 16 29
|   75 6c 03 fb  1e 9c 9d 21  0c a1 e6 c2  f3 f2 49 2c
|   f6 06 73 c1  96 1e ce 58  81 01 1c cb  16 dc f9 fc
|   c7 93 08 75  58 16 57 71  69 96 66 b7  a9 81 7f f7
|   37 4d 7c 41  38 62 a6 39  00 81 ca 3d  1d fc f7 b5
|   08 38 d4 34  70 22 6c 21  d2 5b 20 a1  d2 ba 2a d1
|   89 f3 20 79  ce ac 1e c2  ec 7d ae 76  94 40 39 a0
|   29 00 00 14  20 98 9d 37  a8 14 a6 4d  8f f0 7c 08
|   d3 20 e9 e3  29 00 00 1c  00 00 40 04  27 32 94 6b
|   70 cf ee 15  b8 92 a5 e9  51 d9 2d 19  dc a3 b6 67
|   2b 00 00 1c  00 00 40 05  cd 75 36 6e  bb c6 07 29
|   89 9f 33 c9  b7 8c 95 e9  4e ac a8 b1  00 00 00 10
|   4f 45 70 6c  75 74 6f 75  6e 69 74 30
| #1 complete v2 state transition with STF_OK
./davecertI2 transition from state STATE_IKEv2_START to state STATE_PARENT_I1
| v2_state_transition: st is #1; pst is #0; transition_st is #0
./davecertI2 STATE_PARENT_I1: sent v2I1, expected v2R1 (msgid: 00000000/4294967295)
| *received 376 bytes from 132.213.238.7:500 on eth0 (port=500)
|   8d 0e 0f 10  11 12 13 14  5d 73 ce 75  3d b1 db 6d
|   21 20 22 20  00 00 00 00  00 00 01 78  22 00 00 30
|   00 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  28 00 01 08
|   00 0e 00 00  a5 9a 13 6c  b8 87 48 57  e1 22 6e a0
|   b8 55 c2 00  31 15 65 84  8b f9 dc a4  5f 49 d4 c5
|   f0 98 8e 9b  31 85 6e 27  5a c2 75 09  07 37 05 b5
|   b1 53 18 07  81 e8 1d 07  c6 19 1c de  dc 1f 2c 26
|   d2 0b 59 f9  67 6a ee 3c  e5 fa 72 3f  54 96 1e 7d
|   8e d0 30 08  0b ed 95 b0  65 2f 5c a6  36 7e 92 2d
|   da cb 88 54  e3 97 fa 16  6f 9e 7c a6  0c 43 2f 29
|   be 2c a4 55  68 01 45 bc  56 a9 84 b9  2b 1b bf 9a
|   fc 84 67 5f  d3 04 79 90  b7 fa 89 5b  04 06 d5 9a
|   50 92 16 4b  d6 33 40 be  2a 44 94 74  33 a7 a5 c1
|   1f 88 5b eb  4e d2 bb 94  b9 22 db e3  b6 5a 8c f9
|   d6 43 5d 5e  5d c9 19 b8  c8 81 53 01  95 09 02 7b
|   c0 2a b0 c8  5d 2c 69 78  6c e8 f6 5d  e4 90 43 83
|   fd f7 98 5e  cc 92 5c 79  7b 62 ae 98  db 4f 7f e0
|   68 7c cd 29  69 0a ad a3  e8 37 d7 41  b4 79 b3 a5
|   38 a2 8d a0  69 ff bd aa  ba d5 54 70  40 ab b5 fc
|   26 6d ae ce  2b 00 00 14  c6 ba 31 9f  88 5b e7 b7
|   a2 93 85 dc  bb c6 15 84  00 00 00 10  4f 45 70 6c
|   75 74 6f 75  6e 69 74 30
| **parse ISAKMP Message:
|    initiator cookie:
|   8d 0e 0f 10  11 12 13 14
|    responder cookie:
|   5d 73 ce 75  3d b1 db 6d
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_SA_INIT
|    flags: ISAKMP_FLAG_RESPONSE
|    message ID:  00 00 00 00
|    length: 376
|  processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34), msgid: 00000000
| I am IKE SA Initiator
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  5d 73 ce 75  3d b1 db 6d
| state hash entry 15
| v2 state object not found
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| v2 peer and cookies match on #1
| v2 state object #1 (home) found, in STATE_PARENT_I1
| removing state object #1
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  5d 73 ce 75  3d b1 db 6d
| state hash entry 15
| inserting state object #1 bucket: 15
| state found and its state is:STATE_PARENT_I1 msgid: 00000
| ***parse IKEv2 Security Association Payload:
|    critical bit: none
|    length: 48
| processing payload: ISAKMP_NEXT_v2SA (len=48)
| ***parse IKEv2 Key Exchange Payload:
|    critical bit: none
|    length: 264
|    transform type: 14
| processing payload: ISAKMP_NEXT_v2KE (len=264)
| ***parse IKEv2 Nonce Payload:
|    critical bit: none
|    length: 20
| processing payload: ISAKMP_NEXT_v2Ni (len=20)
| ***parse IKEv2 Vendor ID Payload:
|    critical bit: none
|    length: 16
| processing payload: ISAKMP_NEXT_v2V (len=16)
| considering state entry: 0
| now proceed with state specific processing using state #0 initiator-V2_init
| ikev2 parent inR1: calculating g^{xy} in order to send I2
| ****parse IKEv2 Proposal Substructure Payload:
|    length: 44
|    prop #: 1
|    proto ID: 1
|    spi size: 0
|    # transforms: 4
| *****parse IKEv2 Transform Substructure Payload:
|    length: 12
|    transform type: 1
|    transform ID: 12
| ******parse IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 3
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 2
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 4
|    transform ID: 14
| processor 'initiator-V2_init' returned STF_SUSPEND (2)
| #1 complete v2 state transition with STF_SUSPEND
| ikev2 parent inR1outI2: calculating g^{xy}, sending I2
| ikev2 parent SA details
| ikev2 I 0x8d0e0f1011121314 0x5d73ce753db1db6d sha1:0x4ea8e662b07cdd430f6944c6723e4b82d5722418 aes128:0x3f44bf47cafd8150591deb088199fcbf
| ikev2 R 0x8d0e0f1011121314 0x5d73ce753db1db6d sha1:0x515b0bd22e6d76b34fdb760aa7bfad80b109b75d aes128:0xbedb67ec7dc3d00cccac42e70cd63bde
| duplicating state object #1
| creating state object #2 at Z
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  5d 73 ce 75  3d b1 db 6d
| state hash entry 15
| inserting state object #2 bucket: 15
| **emit ISAKMP Message:
|    initiator cookie:
|   8d 0e 0f 10  11 12 13 14
|    responder cookie:
|   5d 73 ce 75  3d b1 db 6d
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_AUTH
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 01
| ***emit IKEv2 Encryption Payload:
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
|    next-payload: ISAKMP_NEXT_v2IDi [@-20=0x23]
| *****emit IKEv2 Identification Payload:
|    critical bit: none
|    id_type: ID_DER_ASN1_DN
| emitting 159 raw bytes of my identity into IKEv2 Identification Payload
| my identity  30 81 9c 31  0b 30 09 06  03 55 04 06  13 02 43 41
|   31 0b 30 09  06 03 55 04  08 0c 02 4f  4e 31 0f 30
|   0d 06 03 55  04 07 0c 06  4f 74 74 61  77 61 31 1e
|   30 1c 06 03  55 04 0a 0c  15 58 65 6c  65 72 61 6e
|   63 65 20 43  6f 72 70 6f  72 61 74 69  6f 6e 31 11
|   30 0f 06 03  55 04 0b 0c  08 4f 70 65  6e 73 77 61
|   6e 31 1a 30  18 06 03 55  04 03 0c 11  64 61 76 65
|   40 6f 70 65  6e 73 77 61  6e 2e 6f 72  67 31 20 30
|   1e 06 09 2a  86 48 86 f7  0d 01 09 01  16 11 6d 63
|   72 40 78 65  6c 65 72 61  6e 63 65 2e  63 6f 6d
| idhash calc pi  cc 07 97 44  b4 a3 4e 8a  0d 2f 27 8b  ee 06 6d 07
|   a5 a5 75 2e
| idhash calc I2  09 00 00 00  30 81 9c 31  0b 30 09 06  03 55 04 06
|   13 02 43 41  31 0b 30 09  06 03 55 04  08 0c 02 4f
|   4e 31 0f 30  0d 06 03 55  04 07 0c 06  4f 74 74 61
|   77 61 31 1e  30 1c 06 03  55 04 0a 0c  15 58 65 6c
|   65 72 61 6e  63 65 20 43  6f 72 70 6f  72 61 74 69
|   6f 6e 31 11  30 0f 06 03  55 04 0b 0c  08 4f 70 65
|   6e 73 77 61  6e 31 1a 30  18 06 03 55  04 03 0c 11
|   64 61 76 65  40 6f 70 65  6e 73 77 61  6e 2e 6f 72
|   67 31 20 30  1e 06 09 2a  86 48 86 f7  0d 01 09 01
|   16 11 6d 63  72 40 78 65  6c 65 72 61  6e 63 65 2e
|   63 6f 6d
| emitting length of IKEv2 Identification Payload: 167
| IKEv2 thinking whether to send my certificate:
|  my policy has  RSASIG, the policy is : RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|  sendcert: CERT_ALWAYSSEND and I did not get a certificate request
|  so send cert.
| Thinking about sending a certificate request (CERTREQ)
|   my policy is : RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|  my next payload will not be a certificate request
| I did not send a certificate request (CERTREQ) because
|   no known CA for the other end
| I am sending my certificate
|    next-payload: ISAKMP_NEXT_v2CERT [@0=0x25]
| *****emit IKEv2 Certificate Payload:
|    critical bit: none
|    ikev2 cert encoding: CERT_X509_SIGNATURE
| emitting 976 raw bytes of CERT into IKEv2 Certificate Payload
| CERT  30 82 03 cc  30 82 02 b4  02 09 00 8c  b2 68 2f b0
|   f4 5a 91 30  0d 06 09 2a  86 48 86 f7  0d 01 01 0b
|   05 00 30 81  b2 31 0b 30  09 06 03 55  04 06 13 02
|   43 41 31 10  30 0e 06 03  55 04 08 0c  07 4f 6e 74
|   61 72 69 6f  31 0f 30 0d  06 03 55 04  07 0c 06 4f
|   74 74 61 77  61 31 1e 30  1c 06 03 55  04 0a 0c 15
|   58 65 6c 65  72 61 6e 63  65 20 43 6f  72 70 6f 72
|   61 74 69 6f  6e 31 1e 30  1c 06 03 55  04 0b 0c 15
|   44 6f 63 74  6f 72 20 54  61 79 6c 6f  72 20 50 6c
|   75 6d 61 67  65 31 1e 30  1c 06 03 55  04 03 0c 15
|   74 65 73 74  69 6e 67 2e  78 65 6c 65  72 61 6e 63
|   65 2e 63 6f  6d 31 20 30  1e 06 09 2a  86 48 86 f7
|   0d 01 09 01  16 11 6d 63  72 40 78 65  6c 65 72 61
|   6e 63 65 2e  63 6f 6d 30  1e 17 0d 31  37 30 31 31
|   34 31 33 35  31 34 36 5a  17 0d 31 39  31 31 30 34
|   31 33 35 31  34 36 5a 30  81 9c 31 0b  30 09 06 03
|   55 04 06 13  02 43 41 31  0b 30 09 06  03 55 04 08
|   0c 02 4f 4e  31 0f 30 0d  06 03 55 04  07 0c 06 4f
|   74 74 61 77  61 31 1e 30  1c 06 03 55  04 0a 0c 15
|   58 65 6c 65  72 61 6e 63  65 20 43 6f  72 70 6f 72
|   61 74 69 6f  6e 31 11 30  0f 06 03 55  04 0b 0c 08
|   4f 70 65 6e  73 77 61 6e  31 1a 30 18  06 03 55 04
|   03 0c 11 64  61 76 65 40  6f 70 65 6e  73 77 61 6e
|   2e 6f 72 67  31 20 30 1e  06 09 2a 86  48 86 f7 0d
|   01 09 01 16  11 6d 63 72  40 78 65 6c  65 72 61 6e
|   63 65 2e 63  6f 6d 30 82  01 22 30 0d  06 09 2a 86
|   48 86 f7 0d  01 01 01 05  00 03 82 01  0f 00 30 82
|   01 0a 02 82  01 01 00 e3  a8 4c c6 cc  c7 e3 b7 7c
|   e7 4f 15 4b  04 ca fa cb  06 46 c0 dc  08 c1 c8 aa
|   5d 06 b7 7c  55 41 ab cf  a8 00 a9 f3  8a 50 da a4
|   c4 2c 3e 45  e0 f3 b7 91  28 2f d3 b8  89 cf e2 c2
|   33 9a 9d 04  87 3c 9c c3  cd 94 7f 51  70 3c 7f da
|   9b 6d 5e 41  1d b3 6c 9e  84 76 c2 d4  97 21 fb 4b
|   86 9b 10 3b  43 74 42 94  2d e0 bd 2b  d7 74 0e 70
|   99 3a c1 06  f2 b6 45 ab  0c cc 1e bf  90 36 80 08
|   e0 d8 ed 10  c7 a6 e3 df  26 1d 95 73  db e6 f0 50
|   6c 17 b8 6e  77 fc 54 c9  21 1e af 1a  2b 4a 5d d3
|   b0 7b 5d c5  90 b8 01 14  10 85 bc 86  c2 5e 45 73
|   d8 e7 a6 47  60 5c ee 85  80 f4 49 b3  df e2 8d 50
|   b6 d5 ba f8  79 09 53 55  01 31 57 16  ec bc e2 77
|   48 0f e2 c8  4c ed 69 a9  d8 f1 81 0e  ea c3 3e 7d
|   24 c8 bf 75  05 88 2d e7  ed c5 cb 29  ce ec ef 57
|   85 f9 f4 7f  37 c7 a7 b8  79 47 ff ea  68 5c a8 73
|   dc 80 e7 b9  c7 ec 67 02  03 01 00 01  30 0d 06 09
|   2a 86 48 86  f7 0d 01 01  0b 05 00 03  82 01 01 00
|   08 9a 72 74  50 78 77 95  db dc 72 27  ef d5 d7 eb
|   20 50 05 2a  2d a2 2c 13  8b 25 69 3c  7c 97 26 6a
|   db 3d 7f 36  01 41 fb 11  ab 1d 57 e5  d3 f0 c4 a9
|   07 7f 35 b0  7a 2b 13 e6  31 52 f1 4d  57 02 e2 72
|   bc 9c 88 8b  31 b4 3f 60  2c ef c2 92  bd 9f f8 b5
|   d1 fd 0e f7  10 a7 51 65  45 54 a7 97  64 76 d8 95
|   0c bf 2a bd  1f 8c 0b 0a  0c ed 4a f0  1b f7 44 cc
|   e5 41 41 e7  b4 d4 ba af  9c aa 8c 69  9e 5f c3 c0
|   60 dc 1b 46  ca 04 31 36  e6 03 ab 15  45 28 8e 41
|   31 87 10 74  49 d4 93 de  43 d4 11 33  01 bf b8 6b
|   eb bf bf 4c  9d 81 bf 27  2e 1c 0d 45  51 73 3c ea
|   2d 96 da 37  10 a7 76 6e  7c 0f 69 d5  13 2e a1 4b
|   a0 f8 ca 88  80 36 e0 2b  68 cc 6e 0e  86 76 d3 79
|   95 8c 7e 83  46 e6 58 7a  32 69 92 77  4f b3 91 f9
|   b7 60 26 0a  78 30 5e 3d  c2 46 82 c2  4d 93 08 31
|   c4 2e 5c 8d  75 9a 34 50  91 34 48 74  bd 26 2d 95
| emitting length of IKEv2 Certificate Payload: 981
|  payload after AUTH will be ISAKMP_NEXT_v2SA
|    next-payload: ISAKMP_NEXT_v2AUTH [@167=0x27]
| *****emit IKEv2 Authentication Payload:
|    critical bit: none
|    auth method: v2_AUTH_RSA
| emitting 192 zero bytes of fake rsa sig into IKEv2 Authentication Payload
| emitting length of IKEv2 Authentication Payload: 200
| empty esp_info, returning defaults
|    next-payload: ISAKMP_NEXT_v2SA [@1148=0x21]
| *****emit IKEv2 Security Association Payload:
|    critical bit: none
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 1
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 2
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 3
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 4
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| emitting length of IKEv2 Security Association Payload: 156
|    next-payload: ISAKMP_NEXT_v2TSi [@1348=0x2c]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selector
| ipv4 low  5d b8 d8 23
| emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selector
| ipv4 high  5d b8 d8 23
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector Payload: 24
|    next-payload: ISAKMP_NEXT_v2TSr [@1504=0x2d]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selector
| ipv4 low  0a 02 00 00
| emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selector
| ipv4 high  0a 02 ff ff
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector Payload: 24
| emitting 16 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 1600
| emitting length of ISAKMP Message: 1628
| encrypting as INITIATOR, parent SA #1
| data before encryption:
|   25 00 00 a7  09 00 00 00  30 81 9c 31  0b 30 09 06
|   03 55 04 06  13 02 43 41  31 0b 30 09  06 03 55 04
|   08 0c 02 4f  4e 31 0f 30  0d 06 03 55  04 07 0c 06
|   4f 74 74 61  77 61 31 1e  30 1c 06 03  55 04 0a 0c
|   15 58 65 6c  65 72 61 6e  63 65 20 43  6f 72 70 6f
|   72 61 74 69  6f 6e 31 11  30 0f 06 03  55 04 0b 0c
|   08 4f 70 65  6e 73 77 61  6e 31 1a 30  18 06 03 55
|   04 03 0c 11  64 61 76 65  40 6f 70 65  6e 73 77 61
|   6e 2e 6f 72  67 31 20 30  1e 06 09 2a  86 48 86 f7
|   0d 01 09 01  16 11 6d 63  72 40 78 65  6c 65 72 61
|   6e 63 65 2e  63 6f 6d 27  00 03 d5 04  30 82 03 cc
|   30 82 02 b4  02 09 00 8c  b2 68 2f b0  f4 5a 91 30
|   0d 06 09 2a  86 48 86 f7  0d 01 01 0b  05 00 30 81
|   b2 31 0b 30  09 06 03 55  04 06 13 02  43 41 31 10
|   30 0e 06 03  55 04 08 0c  07 4f 6e 74  61 72 69 6f
|   31 0f 30 0d  06 03 55 04  07 0c 06 4f  74 74 61 77
|   61 31 1e 30  1c 06 03 55  04 0a 0c 15  58 65 6c 65
|   72 61 6e 63  65 20 43 6f  72 70 6f 72  61 74 69 6f
|   6e 31 1e 30  1c 06 03 55  04 0b 0c 15  44 6f 63 74
|   6f 72 20 54  61 79 6c 6f  72 20 50 6c  75 6d 61 67
|   65 31 1e 30  1c 06 03 55  04 03 0c 15  74 65 73 74
|   69 6e 67 2e  78 65 6c 65  72 61 6e 63  65 2e 63 6f
|   6d 31 20 30  1e 06 09 2a  86 48 86 f7  0d 01 09 01
|   16 11 6d 63  72 40 78 65  6c 65 72 61  6e 63 65 2e
|   63 6f 6d 30  1e 17 0d 31  37 30 31 31  34 31 33 35
|   31 34 36 5a  17 0d 31 39  31 31 30 34  31 33 35 31
|   34 36 5a 30  81 9c 31 0b  30 09 06 03  55 04 06 13
|   02 43 41 31  0b 30 09 06  03 55 04 08  0c 02 4f 4e
|   31 0f 30 0d  06 03 55 04  07 0c 06 4f  74 74 61 77
|   61 31 1e 30  1c 06 03 55  04 0a 0c 15  58 65 6c 65
|   72 61 6e 63  65 20 43 6f  72 70 6f 72  61 74 69 6f
|   6e 31 11 30  0f 06 03 55  04 0b 0c 08  4f 70 65 6e
|   73 77 61 6e  31 1a 30 18  06 03 55 04  03 0c 11 64
|   61 76 65 40  6f 70 65 6e  73 77 61 6e  2e 6f 72 67
|   31 20 30 1e  06 09 2a 86  48 86 f7 0d  01 09 01 16
|   11 6d 63 72  40 78 65 6c  65 72 61 6e  63 65 2e 63
|   6f 6d 30 82  01 22 30 0d  06 09 2a 86  48 86 f7 0d
|   01 01 01 05  00 03 82 01  0f 00 30 82  01 0a 02 82
|   01 01 00 e3  a8 4c c6 cc  c7 e3 b7 7c  e7 4f 15 4b
|   04 ca fa cb  06 46 c0 dc  08 c1 c8 aa  5d 06 b7 7c
|   55 41 ab cf  a8 00 a9 f3  8a 50 da a4  c4 2c 3e 45
|   e0 f3 b7 91  28 2f d3 b8  89 cf e2 c2  33 9a 9d 04
|   87 3c 9c c3  cd 94 7f 51  70 3c 7f da  9b 6d 5e 41
|   1d b3 6c 9e  84 76 c2 d4  97 21 fb 4b  86 9b 10 3b
|   43 74 42 94  2d e0 bd 2b  d7 74 0e 70  99 3a c1 06
|   f2 b6 45 ab  0c cc 1e bf  90 36 80 08  e0 d8 ed 10
|   c7 a6 e3 df  26 1d 95 73  db e6 f0 50  6c 17 b8 6e
|   77 fc 54 c9  21 1e af 1a  2b 4a 5d d3  b0 7b 5d c5
|   90 b8 01 14  10 85 bc 86  c2 5e 45 73  d8 e7 a6 47
|   60 5c ee 85  80 f4 49 b3  df e2 8d 50  b6 d5 ba f8
|   79 09 53 55  01 31 57 16  ec bc e2 77  48 0f e2 c8
|   4c ed 69 a9  d8 f1 81 0e  ea c3 3e 7d  24 c8 bf 75
|   05 88 2d e7  ed c5 cb 29  ce ec ef 57  85 f9 f4 7f
|   37 c7 a7 b8  79 47 ff ea  68 5c a8 73  dc 80 e7 b9
|   c7 ec 67 02  03 01 00 01  30 0d 06 09  2a 86 48 86
|   f7 0d 01 01  0b 05 00 03  82 01 01 00  08 9a 72 74
|   50 78 77 95  db dc 72 27  ef d5 d7 eb  20 50 05 2a
|   2d a2 2c 13  8b 25 69 3c  7c 97 26 6a  db 3d 7f 36
|   01 41 fb 11  ab 1d 57 e5  d3 f0 c4 a9  07 7f 35 b0
|   7a 2b 13 e6  31 52 f1 4d  57 02 e2 72  bc 9c 88 8b
|   31 b4 3f 60  2c ef c2 92  bd 9f f8 b5  d1 fd 0e f7
|   10 a7 51 65  45 54 a7 97  64 76 d8 95  0c bf 2a bd
|   1f 8c 0b 0a  0c ed 4a f0  1b f7 44 cc  e5 41 41 e7
|   b4 d4 ba af  9c aa 8c 69  9e 5f c3 c0  60 dc 1b 46
|   ca 04 31 36  e6 03 ab 15  45 28 8e 41  31 87 10 74
|   49 d4 93 de  43 d4 11 33  01 bf b8 6b  eb bf bf 4c
|   9d 81 bf 27  2e 1c 0d 45  51 73 3c ea  2d 96 da 37
|   10 a7 76 6e  7c 0f 69 d5  13 2e a1 4b  a0 f8 ca 88
|   80 36 e0 2b  68 cc 6e 0e  86 76 d3 79  95 8c 7e 83
|   46 e6 58 7a  32 69 92 77  4f b3 91 f9  b7 60 26 0a
|   78 30 5e 3d  c2 46 82 c2  4d 93 08 31  c4 2e 5c 8d
|   75 9a 34 50  91 34 48 74  bd 26 2d 95  21 00 00 c8
|   01 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  2c 00 00 9c  02 00 00 28  01 03 04 03
|   12 34 56 78  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 02  00 00 00 08  05 00 00 00
|   02 00 00 28  02 03 04 03  12 34 56 78  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 01
|   00 00 00 08  05 00 00 00  02 00 00 24  03 03 04 03
|   12 34 56 78  03 00 00 08  01 00 00 03  03 00 00 08
|   03 00 00 02  00 00 00 08  05 00 00 00  00 00 00 24
|   04 03 04 03  12 34 56 78  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  00 00 00 08  05 00 00 00
|   2d 00 00 18  01 00 00 00  07 00 00 10  00 00 ff ff
|   5d b8 d8 23  5d b8 d8 23  00 00 00 18  01 00 00 00
|   07 00 00 10  00 00 ff ff  0a 02 00 00  0a 02 ff ff
|   00 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
| data after encryption:
|   53 84 68 a8  31 39 a2 aa  76 e4 37 41  a6 a0 f8 b2
|   bb 4c 4e 97  dd 43 7a 61  0b 03 30 11  3c 79 5a 42
|   03 ec 9f ac  a6 24 0d 1d  1d de 3f 93  ea 8e b4 74
|   1e a6 0d 3d  7b 98 ef 75  11 b1 17 f3  cf 59 ec b4
|   a1 5b 59 7b  03 2b 6d 6f  4b a7 39 09  f9 2c 85 d5
|   79 f5 30 35  65 c6 fc 6d  01 17 de 6d  5b 4d 44 b3
|   36 79 7d 57  6d be d3 f5  d9 81 2c 2c  5a 95 c7 5f
|   12 ca 7c 8a  a8 fc 4a 6e  80 c6 f5 c2  65 8e e1 a5
|   7b 0d ff 11  12 14 e7 c0  ca c0 14 04  5d 1b 80 8b
|   79 d4 9a b3  1e ba 9f 59  8b 6c 00 5a  4b f3 ff ff
|   58 39 e7 48  ff d8 39 5b  d2 cf ee c0  33 67 82 e5
|   9f 39 04 53  ab 16 56 cb  95 07 22 44  99 f2 71 1c
|   3a ad 7d 96  fa 75 b8 98  ec 29 0c c2  76 85 d8 fb
|   b1 82 18 36  be 87 17 68  46 6c f7 bb  f6 5e aa 41
|   c9 cf 2d 6e  4d 21 c8 b3  01 50 bb c2  61 40 9a 85
|   26 ee 04 e9  c8 11 b9 05  51 77 83 f8  5d 1e 84 05
|   5f 03 8f e8  9f 82 ab 76  d4 82 fc 86  9a bb cd 77
|   c2 25 6c 9d  97 04 80 06  d7 76 f9 98  a3 32 d5 ab
|   dd df ca 57  f7 42 53 38  db 3e 70 54  83 69 ed 09
|   6a 1e 03 e5  fa a5 c0 29  40 77 45 a3  27 d8 50 43
|   49 fd b3 39  9b e8 92 7e  4d b9 87 2a  0a 3d 3f 61
|   c3 c9 8b 95  0e 28 81 89  14 32 b6 79  46 ac e1 0e
|   6a 1e 14 ea  3e 40 dc 9b  37 32 97 86  78 38 42 87
|   8b a7 1e 63  92 f9 de c8  21 b9 43 a4  57 57 47 ef
|   a8 97 81 53  71 20 2b 01  96 7f ea d5  59 43 b7 22
|   3d 27 69 ca  60 a6 d6 a0  07 56 4a 62  34 53 fc 28
|   a0 d3 cf 31  f0 07 2d 41  b3 f3 64 c8  19 7c ab 17
|   90 84 8b 98  e6 02 88 13  16 72 54 ed  c9 75 03 ad
|   d1 a9 f6 51  f9 18 5c fc  8b 36 2b 16  cd 36 90 f4
|   7e e1 9a 78  5a 94 93 c0  a6 7b cb 59  1a d1 a3 8d
|   4b 91 6a af  3c 7a 3a 04  4b 82 bc 6f  59 5f 98 69
|   57 b3 cb 43  9c 0c eb a4  81 29 11 ed  44 ba 29 74
|   26 52 a9 b8  1b 57 44 7b  62 5c 33 91  67 e9 f6 f2
|   0f ea e1 ab  b2 86 b8 16  94 c7 f6 03  01 83 a4 1c
|   e0 b7 f1 78  81 f7 66 62  f2 4d c7 df  5d ea 6b 97
|   45 4f eb 45  33 e1 67 96  62 91 2d c8  ea 75 bb f0
|   ce b3 7e c2  9c b1 34 aa  be ba 76 df  3f 0c 26 9f
|   e3 d9 96 25  96 86 fe 16  db 92 3a 0f  c5 ed 99 a8
|   c6 d0 a4 91  46 f1 18 1e  16 00 fa 15  b8 73 17 1e
|   ae 47 95 e8  3b 37 43 76  34 bd 60 63  cc b3 a6 72
|   37 73 04 8b  f9 6b 71 ad  e9 9c 95 c4  e6 4a 71 35
|   22 77 11 83  fc a2 a5 5a  d9 51 cd 67  de 9a 64 87
|   33 a4 b7 64  39 d8 b3 aa  8c f8 dc 45  65 fc 9b 28
|   13 f2 54 01  da e3 eb 6a  25 05 e0 c5  73 4a 3f 96
|   dc e9 d7 7c  82 cd 57 18  e1 84 fa 41  94 f8 b4 b6
|   8b 86 f9 3b  90 72 4a 32  e4 1f 6b 4a  b0 72 79 76
|   d3 78 9a d9  ff b8 ff 94  ba 4e b9 8b  0d 86 52 ed
|   64 e5 71 ec  69 95 aa f9  5f 1a 25 11  b0 8d 80 93
|   13 64 f4 e5  bf 0f fc 21  b7 07 ce a0  0c 56 f1 cf
|   f1 39 b3 41  ec d8 33 59  dd 59 7d f3  98 73 c8 8f
|   4b d2 4f e6  79 15 15 6c  17 27 e2 92  ea 9e 6a b4
|   96 46 b6 12  38 56 a4 67  93 3c 9e 72  7e 7f 74 c9
|   5f f3 ce e8  21 34 ae 31  63 f9 16 67  68 0b ed f0
|   99 cd bc ad  40 10 a2 8c  70 73 3f 66  e7 1a f3 82
|   f2 ad 0e 3b  e9 dd 38 de  3a 7f dc 83  a0 83 ff f2
|   c1 a5 ac 52  b2 65 f7 e0  0d d3 71 6a  bc ca 6b 07
|   8b 79 0b 2e  1b 8f dc 04  e3 b6 ea b8  ee 56 a9 81
|   10 56 c9 e0  63 16 59 fd  62 b2 48 41  52 a0 e1 20
|   9a b3 a6 1c  9f a3 f1 7e  74 74 82 da  99 ba 22 78
|   cd 06 19 88  a7 9e 73 e9  f2 b4 34 86  81 d1 da 84
|   06 ba e7 94  f5 c3 2e c9  64 a3 c8 47  61 e9 de 1a
|   43 d4 7a 52  b8 81 28 7e  a1 3b 80 54  e9 86 4d e5
|   09 1e b3 b7  d5 ff 43 1f  a6 c7 4d 6a  89 1d bd 29
|   08 0c 80 37  56 8d 6f a5  20 09 4c f1  80 5c f5 fe
|   3b 9d 76 85  fd 6b ac a2  17 80 55 57  77 27 60 7c
|   a8 62 c4 ed  6e e0 a4 06  a7 ea 71 65  7c 2e 7f 98
|   c9 51 38 54  2f ef df fb  94 92 04 0f  86 af b8 26
|   1f 7e 53 dd  84 2c db cf  5d f8 5d 53  dd f7 c0 d0
|   c5 43 00 c8  b3 38 6e 6d  43 c2 c3 b6  89 b8 0e b5
|   8c 9a 43 0d  cb 24 27 49  d0 aa a9 29  29 96 51 c6
|   eb 06 fc ce  a7 97 8f b9  12 51 b0 4a  e2 15 99 c0
|   da 5a 78 97  73 03 28 99  de dc 32 86  de c7 78 48
|   54 cd 39 87  8a 13 0a c3  d5 53 52 be  08 35 d6 80
|   28 b2 1e 58  93 44 e5 2e  67 32 4e 3f  55 08 c4 10
|   43 60 ed 78  30 4f 97 39  ff 9a a3 4c  33 a0 b9 db
|   e7 e1 6a 48  0a 30 57 07  be 1c 74 fc  fb 6d bf 5b
|   33 2c 29 3b  b6 af 5d e8  e8 8d 85 19  03 c2 ae 11
|   2a 8f 5b 72  68 09 2c 4e  76 9c 07 80  4d 94 9a 88
|   53 5c be f7  a4 01 23 3e  2f 25 22 11  ff 1c 91 da
|   23 09 21 e6  2d 8a f0 4c  f2 bf 63 72  6c 5b 5b ef
|   05 bb dc d4  38 3c 55 b8  03 38 df 3a  db 65 09 a6
|   39 b0 a1 2b  6f 8a 9e 5d  88 ce 3c 33  49 eb 0a 65
|   50 c1 d4 a2  18 e4 f8 ab  48 72 3d be  f7 66 bb 08
|   17 70 bd db  00 90 b3 b6  b8 a6 b9 10  f6 a9 28 79
|   6c 8a 5a 15  54 f5 c0 8f  10 7f 5a ab  80 49 a5 2a
|   14 2e 7a 74  df 33 b7 c2  19 92 a7 1e  cd 3e f8 f5
|   bb 39 2e 1e  ff c0 72 21  b4 48 2c e8  03 d8 4a bc
|   81 8e 3c fd  c3 92 cb 05  9c 06 36 ec  6a bd 03 ed
|   75 79 d2 35  80 1a e5 47  d4 2e 86 d8  42 aa 88 6f
|   83 cc 79 69  f6 f1 c3 11  62 79 01 76  f8 05 dd 62
|   a6 cc 59 07  48 cf 6f 2e  52 26 50 ab  a4 06 83 b2
|   36 78 5c fe  fb 54 0a 0b  9a 46 19 15  df 7c 75 be
|   41 a1 c1 39  7b 57 dd 3d  53 48 be ce  43 9b 4d 67
|   f1 83 81 76  2c c3 eb 3e  5f 4e 7e 93  f4 6e 88 f9
|   f2 bd de 6f  a3 d2 ce 57  a2 17 85 9e  c2 cf 54 cd
|   1a 77 2d c9  76 69 76 52  f5 46 6f b4  db f9 cb 42
|   16 85 e4 87  c3 be 3a a6  d6 cc 0a 93  e0 13 74 4d
|   29 44 f0 db  8f fb 8d e4  70 93 56 08  5f 1f 17 26
| data being hmac:  8d 0e 0f 10  11 12 13 14  5d 73 ce 75  3d b1 db 6d
|   2e 20 23 08  00 00 00 01  00 00 06 5c  23 00 06 40
|   8d 0e 0f 10  11 12 13 14  15 16 17 18  19 1a 1b 1c
|   53 84 68 a8  31 39 a2 aa  76 e4 37 41  a6 a0 f8 b2
|   bb 4c 4e 97  dd 43 7a 61  0b 03 30 11  3c 79 5a 42
|   03 ec 9f ac  a6 24 0d 1d  1d de 3f 93  ea 8e b4 74
|   1e a6 0d 3d  7b 98 ef 75  11 b1 17 f3  cf 59 ec b4
|   a1 5b 59 7b  03 2b 6d 6f  4b a7 39 09  f9 2c 85 d5
|   79 f5 30 35  65 c6 fc 6d  01 17 de 6d  5b 4d 44 b3
|   36 79 7d 57  6d be d3 f5  d9 81 2c 2c  5a 95 c7 5f
|   12 ca 7c 8a  a8 fc 4a 6e  80 c6 f5 c2  65 8e e1 a5
|   7b 0d ff 11  12 14 e7 c0  ca c0 14 04  5d 1b 80 8b
|   79 d4 9a b3  1e ba 9f 59  8b 6c 00 5a  4b f3 ff ff
|   58 39 e7 48  ff d8 39 5b  d2 cf ee c0  33 67 82 e5
|   9f 39 04 53  ab 16 56 cb  95 07 22 44  99 f2 71 1c
|   3a ad 7d 96  fa 75 b8 98  ec 29 0c c2  76 85 d8 fb
|   b1 82 18 36  be 87 17 68  46 6c f7 bb  f6 5e aa 41
|   c9 cf 2d 6e  4d 21 c8 b3  01 50 bb c2  61 40 9a 85
|   26 ee 04 e9  c8 11 b9 05  51 77 83 f8  5d 1e 84 05
|   5f 03 8f e8  9f 82 ab 76  d4 82 fc 86  9a bb cd 77
|   c2 25 6c 9d  97 04 80 06  d7 76 f9 98  a3 32 d5 ab
|   dd df ca 57  f7 42 53 38  db 3e 70 54  83 69 ed 09
|   6a 1e 03 e5  fa a5 c0 29  40 77 45 a3  27 d8 50 43
|   49 fd b3 39  9b e8 92 7e  4d b9 87 2a  0a 3d 3f 61
|   c3 c9 8b 95  0e 28 81 89  14 32 b6 79  46 ac e1 0e
|   6a 1e 14 ea  3e 40 dc 9b  37 32 97 86  78 38 42 87
|   8b a7 1e 63  92 f9 de c8  21 b9 43 a4  57 57 47 ef
|   a8 97 81 53  71 20 2b 01  96 7f ea d5  59 43 b7 22
|   3d 27 69 ca  60 a6 d6 a0  07 56 4a 62  34 53 fc 28
|   a0 d3 cf 31  f0 07 2d 41  b3 f3 64 c8  19 7c ab 17
|   90 84 8b 98  e6 02 88 13  16 72 54 ed  c9 75 03 ad
|   d1 a9 f6 51  f9 18 5c fc  8b 36 2b 16  cd 36 90 f4
|   7e e1 9a 78  5a 94 93 c0  a6 7b cb 59  1a d1 a3 8d
|   4b 91 6a af  3c 7a 3a 04  4b 82 bc 6f  59 5f 98 69
|   57 b3 cb 43  9c 0c eb a4  81 29 11 ed  44 ba 29 74
|   26 52 a9 b8  1b 57 44 7b  62 5c 33 91  67 e9 f6 f2
|   0f ea e1 ab  b2 86 b8 16  94 c7 f6 03  01 83 a4 1c
|   e0 b7 f1 78  81 f7 66 62  f2 4d c7 df  5d ea 6b 97
|   45 4f eb 45  33 e1 67 96  62 91 2d c8  ea 75 bb f0
|   ce b3 7e c2  9c b1 34 aa  be ba 76 df  3f 0c 26 9f
|   e3 d9 96 25  96 86 fe 16  db 92 3a 0f  c5 ed 99 a8
|   c6 d0 a4 91  46 f1 18 1e  16 00 fa 15  b8 73 17 1e
|   ae 47 95 e8  3b 37 43 76  34 bd 60 63  cc b3 a6 72
|   37 73 04 8b  f9 6b 71 ad  e9 9c 95 c4  e6 4a 71 35
|   22 77 11 83  fc a2 a5 5a  d9 51 cd 67  de 9a 64 87
|   33 a4 b7 64  39 d8 b3 aa  8c f8 dc 45  65 fc 9b 28
|   13 f2 54 01  da e3 eb 6a  25 05 e0 c5  73 4a 3f 96
|   dc e9 d7 7c  82 cd 57 18  e1 84 fa 41  94 f8 b4 b6
|   8b 86 f9 3b  90 72 4a 32  e4 1f 6b 4a  b0 72 79 76
|   d3 78 9a d9  ff b8 ff 94  ba 4e b9 8b  0d 86 52 ed
|   64 e5 71 ec  69 95 aa f9  5f 1a 25 11  b0 8d 80 93
|   13 64 f4 e5  bf 0f fc 21  b7 07 ce a0  0c 56 f1 cf
|   f1 39 b3 41  ec d8 33 59  dd 59 7d f3  98 73 c8 8f
|   4b d2 4f e6  79 15 15 6c  17 27 e2 92  ea 9e 6a b4
|   96 46 b6 12  38 56 a4 67  93 3c 9e 72  7e 7f 74 c9
|   5f f3 ce e8  21 34 ae 31  63 f9 16 67  68 0b ed f0
|   99 cd bc ad  40 10 a2 8c  70 73 3f 66  e7 1a f3 82
|   f2 ad 0e 3b  e9 dd 38 de  3a 7f dc 83  a0 83 ff f2
|   c1 a5 ac 52  b2 65 f7 e0  0d d3 71 6a  bc ca 6b 07
|   8b 79 0b 2e  1b 8f dc 04  e3 b6 ea b8  ee 56 a9 81
|   10 56 c9 e0  63 16 59 fd  62 b2 48 41  52 a0 e1 20
|   9a b3 a6 1c  9f a3 f1 7e  74 74 82 da  99 ba 22 78
|   cd 06 19 88  a7 9e 73 e9  f2 b4 34 86  81 d1 da 84
|   06 ba e7 94  f5 c3 2e c9  64 a3 c8 47  61 e9 de 1a
|   43 d4 7a 52  b8 81 28 7e  a1 3b 80 54  e9 86 4d e5
|   09 1e b3 b7  d5 ff 43 1f  a6 c7 4d 6a  89 1d bd 29
|   08 0c 80 37  56 8d 6f a5  20 09 4c f1  80 5c f5 fe
|   3b 9d 76 85  fd 6b ac a2  17 80 55 57  77 27 60 7c
|   a8 62 c4 ed  6e e0 a4 06  a7 ea 71 65  7c 2e 7f 98
|   c9 51 38 54  2f ef df fb  94 92 04 0f  86 af b8 26
|   1f 7e 53 dd  84 2c db cf  5d f8 5d 53  dd f7 c0 d0
|   c5 43 00 c8  b3 38 6e 6d  43 c2 c3 b6  89 b8 0e b5
|   8c 9a 43 0d  cb 24 27 49  d0 aa a9 29  29 96 51 c6
|   eb 06 fc ce  a7 97 8f b9  12 51 b0 4a  e2 15 99 c0
|   da 5a 78 97  73 03 28 99  de dc 32 86  de c7 78 48
|   54 cd 39 87  8a 13 0a c3  d5 53 52 be  08 35 d6 80
|   28 b2 1e 58  93 44 e5 2e  67 32 4e 3f  55 08 c4 10
|   43 60 ed 78  30 4f 97 39  ff 9a a3 4c  33 a0 b9 db
|   e7 e1 6a 48  0a 30 57 07  be 1c 74 fc  fb 6d bf 5b
|   33 2c 29 3b  b6 af 5d e8  e8 8d 85 19  03 c2 ae 11
|   2a 8f 5b 72  68 09 2c 4e  76 9c 07 80  4d 94 9a 88
|   53 5c be f7  a4 01 23 3e  2f 25 22 11  ff 1c 91 da
|   23 09 21 e6  2d 8a f0 4c  f2 bf 63 72  6c 5b 5b ef
|   05 bb dc d4  38 3c 55 b8  03 38 df 3a  db 65 09 a6
|   39 b0 a1 2b  6f 8a 9e 5d  88 ce 3c 33  49 eb 0a 65
|   50 c1 d4 a2  18 e4 f8 ab  48 72 3d be  f7 66 bb 08
|   17 70 bd db  00 90 b3 b6  b8 a6 b9 10  f6 a9 28 79
|   6c 8a 5a 15  54 f5 c0 8f  10 7f 5a ab  80 49 a5 2a
|   14 2e 7a 74  df 33 b7 c2  19 92 a7 1e  cd 3e f8 f5
|   bb 39 2e 1e  ff c0 72 21  b4 48 2c e8  03 d8 4a bc
|   81 8e 3c fd  c3 92 cb 05  9c 06 36 ec  6a bd 03 ed
|   75 79 d2 35  80 1a e5 47  d4 2e 86 d8  42 aa 88 6f
|   83 cc 79 69  f6 f1 c3 11  62 79 01 76  f8 05 dd 62
|   a6 cc 59 07  48 cf 6f 2e  52 26 50 ab  a4 06 83 b2
|   36 78 5c fe  fb 54 0a 0b  9a 46 19 15  df 7c 75 be
|   41 a1 c1 39  7b 57 dd 3d  53 48 be ce  43 9b 4d 67
|   f1 83 81 76  2c c3 eb 3e  5f 4e 7e 93  f4 6e 88 f9
|   f2 bd de 6f  a3 d2 ce 57  a2 17 85 9e  c2 cf 54 cd
|   1a 77 2d c9  76 69 76 52  f5 46 6f b4  db f9 cb 42
|   16 85 e4 87  c3 be 3a a6  d6 cc 0a 93  e0 13 74 4d
|   29 44 f0 db  8f fb 8d e4  70 93 56 08  5f 1f 17 26
| out calculated auth:
|   a3 1a 57 53  be b0 31 4c  d0 f6 41 81
| #2 complete v2 state transition with STF_OK
./davecertI2 transition from state STATE_PARENT_I1 to state STATE_PARENT_I2
| v2_state_transition: st is #2; pst is #1; transition_st is #1
./davecertI2 STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 oursig=fakesig1 theirsig= cipher=aes_128 integ=sha1_96 prf=oakley_sha group=modp2048} (msgid: 00000000/4294967295)
| sending reply packet to 132.213.238.7:500 (from port 500)
sending 1628 bytes for STATE_PARENT_I1 through eth0:500 [93.184.216.35:500] to 132.213.238.7:500 (using #2)
|   8d 0e 0f 10  11 12 13 14  5d 73 ce 75  3d b1 db 6d
|   2e 20 23 08  00 00 00 01  00 00 06 5c  23 00 06 40
|   8d 0e 0f 10  11 12 13 14  15 16 17 18  19 1a 1b 1c
|   53 84 68 a8  31 39 a2 aa  76 e4 37 41  a6 a0 f8 b2
|   bb 4c 4e 97  dd 43 7a 61  0b 03 30 11  3c 79 5a 42
|   03 ec 9f ac  a6 24 0d 1d  1d de 3f 93  ea 8e b4 74
|   1e a6 0d 3d  7b 98 ef 75  11 b1 17 f3  cf 59 ec b4
|   a1 5b 59 7b  03 2b 6d 6f  4b a7 39 09  f9 2c 85 d5
|   79 f5 30 35  65 c6 fc 6d  01 17 de 6d  5b 4d 44 b3
|   36 79 7d 57  6d be d3 f5  d9 81 2c 2c  5a 95 c7 5f
|   12 ca 7c 8a  a8 fc 4a 6e  80 c6 f5 c2  65 8e e1 a5
|   7b 0d ff 11  12 14 e7 c0  ca c0 14 04  5d 1b 80 8b
|   79 d4 9a b3  1e ba 9f 59  8b 6c 00 5a  4b f3 ff ff
|   58 39 e7 48  ff d8 39 5b  d2 cf ee c0  33 67 82 e5
|   9f 39 04 53  ab 16 56 cb  95 07 22 44  99 f2 71 1c
|   3a ad 7d 96  fa 75 b8 98  ec 29 0c c2  76 85 d8 fb
|   b1 82 18 36  be 87 17 68  46 6c f7 bb  f6 5e aa 41
|   c9 cf 2d 6e  4d 21 c8 b3  01 50 bb c2  61 40 9a 85
|   26 ee 04 e9  c8 11 b9 05  51 77 83 f8  5d 1e 84 05
|   5f 03 8f e8  9f 82 ab 76  d4 82 fc 86  9a bb cd 77
|   c2 25 6c 9d  97 04 80 06  d7 76 f9 98  a3 32 d5 ab
|   dd df ca 57  f7 42 53 38  db 3e 70 54  83 69 ed 09
|   6a 1e 03 e5  fa a5 c0 29  40 77 45 a3  27 d8 50 43
|   49 fd b3 39  9b e8 92 7e  4d b9 87 2a  0a 3d 3f 61
|   c3 c9 8b 95  0e 28 81 89  14 32 b6 79  46 ac e1 0e
|   6a 1e 14 ea  3e 40 dc 9b  37 32 97 86  78 38 42 87
|   8b a7 1e 63  92 f9 de c8  21 b9 43 a4  57 57 47 ef
|   a8 97 81 53  71 20 2b 01  96 7f ea d5  59 43 b7 22
|   3d 27 69 ca  60 a6 d6 a0  07 56 4a 62  34 53 fc 28
|   a0 d3 cf 31  f0 07 2d 41  b3 f3 64 c8  19 7c ab 17
|   90 84 8b 98  e6 02 88 13  16 72 54 ed  c9 75 03 ad
|   d1 a9 f6 51  f9 18 5c fc  8b 36 2b 16  cd 36 90 f4
|   7e e1 9a 78  5a 94 93 c0  a6 7b cb 59  1a d1 a3 8d
|   4b 91 6a af  3c 7a 3a 04  4b 82 bc 6f  59 5f 98 69
|   57 b3 cb 43  9c 0c eb a4  81 29 11 ed  44 ba 29 74
|   26 52 a9 b8  1b 57 44 7b  62 5c 33 91  67 e9 f6 f2
|   0f ea e1 ab  b2 86 b8 16  94 c7 f6 03  01 83 a4 1c
|   e0 b7 f1 78  81 f7 66 62  f2 4d c7 df  5d ea 6b 97
|   45 4f eb 45  33 e1 67 96  62 91 2d c8  ea 75 bb f0
|   ce b3 7e c2  9c b1 34 aa  be ba 76 df  3f 0c 26 9f
|   e3 d9 96 25  96 86 fe 16  db 92 3a 0f  c5 ed 99 a8
|   c6 d0 a4 91  46 f1 18 1e  16 00 fa 15  b8 73 17 1e
|   ae 47 95 e8  3b 37 43 76  34 bd 60 63  cc b3 a6 72
|   37 73 04 8b  f9 6b 71 ad  e9 9c 95 c4  e6 4a 71 35
|   22 77 11 83  fc a2 a5 5a  d9 51 cd 67  de 9a 64 87
|   33 a4 b7 64  39 d8 b3 aa  8c f8 dc 45  65 fc 9b 28
|   13 f2 54 01  da e3 eb 6a  25 05 e0 c5  73 4a 3f 96
|   dc e9 d7 7c  82 cd 57 18  e1 84 fa 41  94 f8 b4 b6
|   8b 86 f9 3b  90 72 4a 32  e4 1f 6b 4a  b0 72 79 76
|   d3 78 9a d9  ff b8 ff 94  ba 4e b9 8b  0d 86 52 ed
|   64 e5 71 ec  69 95 aa f9  5f 1a 25 11  b0 8d 80 93
|   13 64 f4 e5  bf 0f fc 21  b7 07 ce a0  0c 56 f1 cf
|   f1 39 b3 41  ec d8 33 59  dd 59 7d f3  98 73 c8 8f
|   4b d2 4f e6  79 15 15 6c  17 27 e2 92  ea 9e 6a b4
|   96 46 b6 12  38 56 a4 67  93 3c 9e 72  7e 7f 74 c9
|   5f f3 ce e8  21 34 ae 31  63 f9 16 67  68 0b ed f0
|   99 cd bc ad  40 10 a2 8c  70 73 3f 66  e7 1a f3 82
|   f2 ad 0e 3b  e9 dd 38 de  3a 7f dc 83  a0 83 ff f2
|   c1 a5 ac 52  b2 65 f7 e0  0d d3 71 6a  bc ca 6b 07
|   8b 79 0b 2e  1b 8f dc 04  e3 b6 ea b8  ee 56 a9 81
|   10 56 c9 e0  63 16 59 fd  62 b2 48 41  52 a0 e1 20
|   9a b3 a6 1c  9f a3 f1 7e  74 74 82 da  99 ba 22 78
|   cd 06 19 88  a7 9e 73 e9  f2 b4 34 86  81 d1 da 84
|   06 ba e7 94  f5 c3 2e c9  64 a3 c8 47  61 e9 de 1a
|   43 d4 7a 52  b8 81 28 7e  a1 3b 80 54  e9 86 4d e5
|   09 1e b3 b7  d5 ff 43 1f  a6 c7 4d 6a  89 1d bd 29
|   08 0c 80 37  56 8d 6f a5  20 09 4c f1  80 5c f5 fe
|   3b 9d 76 85  fd 6b ac a2  17 80 55 57  77 27 60 7c
|   a8 62 c4 ed  6e e0 a4 06  a7 ea 71 65  7c 2e 7f 98
|   c9 51 38 54  2f ef df fb  94 92 04 0f  86 af b8 26
|   1f 7e 53 dd  84 2c db cf  5d f8 5d 53  dd f7 c0 d0
|   c5 43 00 c8  b3 38 6e 6d  43 c2 c3 b6  89 b8 0e b5
|   8c 9a 43 0d  cb 24 27 49  d0 aa a9 29  29 96 51 c6
|   eb 06 fc ce  a7 97 8f b9  12 51 b0 4a  e2 15 99 c0
|   da 5a 78 97  73 03 28 99  de dc 32 86  de c7 78 48
|   54 cd 39 87  8a 13 0a c3  d5 53 52 be  08 35 d6 80
|   28 b2 1e 58  93 44 e5 2e  67 32 4e 3f  55 08 c4 10
|   43 60 ed 78  30 4f 97 39  ff 9a a3 4c  33 a0 b9 db
|   e7 e1 6a 48  0a 30 57 07  be 1c 74 fc  fb 6d bf 5b
|   33 2c 29 3b  b6 af 5d e8  e8 8d 85 19  03 c2 ae 11
|   2a 8f 5b 72  68 09 2c 4e  76 9c 07 80  4d 94 9a 88
|   53 5c be f7  a4 01 23 3e  2f 25 22 11  ff 1c 91 da
|   23 09 21 e6  2d 8a f0 4c  f2 bf 63 72  6c 5b 5b ef
|   05 bb dc d4  38 3c 55 b8  03 38 df 3a  db 65 09 a6
|   39 b0 a1 2b  6f 8a 9e 5d  88 ce 3c 33  49 eb 0a 65
|   50 c1 d4 a2  18 e4 f8 ab  48 72 3d be  f7 66 bb 08
|   17 70 bd db  00 90 b3 b6  b8 a6 b9 10  f6 a9 28 79
|   6c 8a 5a 15  54 f5 c0 8f  10 7f 5a ab  80 49 a5 2a
|   14 2e 7a 74  df 33 b7 c2  19 92 a7 1e  cd 3e f8 f5
|   bb 39 2e 1e  ff c0 72 21  b4 48 2c e8  03 d8 4a bc
|   81 8e 3c fd  c3 92 cb 05  9c 06 36 ec  6a bd 03 ed
|   75 79 d2 35  80 1a e5 47  d4 2e 86 d8  42 aa 88 6f
|   83 cc 79 69  f6 f1 c3 11  62 79 01 76  f8 05 dd 62
|   a6 cc 59 07  48 cf 6f 2e  52 26 50 ab  a4 06 83 b2
|   36 78 5c fe  fb 54 0a 0b  9a 46 19 15  df 7c 75 be
|   41 a1 c1 39  7b 57 dd 3d  53 48 be ce  43 9b 4d 67
|   f1 83 81 76  2c c3 eb 3e  5f 4e 7e 93  f4 6e 88 f9
|   f2 bd de 6f  a3 d2 ce 57  a2 17 85 9e  c2 cf 54 cd
|   1a 77 2d c9  76 69 76 52  f5 46 6f b4  db f9 cb 42
|   16 85 e4 87  c3 be 3a a6  d6 cc 0a 93  e0 13 74 4d
|   29 44 f0 db  8f fb 8d e4  70 93 56 08  5f 1f 17 26
|   a3 1a 57 53  be b0 31 4c  d0 f6 41 81
./davecertI2 deleting connection
| pass 0: considering CHILD SAs to delete
./davecertI2 deleting state #2 (STATE_CHILD_C0_KEYING)
| received request to delete child state
| removing state object #2
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  5d 73 ce 75  3d b1 db 6d
| state hash entry 15
./davecertI2 deleting state #1 (STATE_PARENT_I2)
| considering request to delete IKE parent state
| sending IKE SA delete request
| **emit ISAKMP Message:
|    initiator cookie:
|   8d 0e 0f 10  11 12 13 14
|    responder cookie:
|   5d 73 ce 75  3d b1 db 6d
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_INFORMATIONAL
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 02
| ***emit IKEv2 Encryption Payload:
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
| *****emit IKEv2 Delete Payload:
|    critical bit: none
|    protocol ID: 1
|    SPI size: 0
|    number of SPIs: 0
| emitting length of IKEv2 Delete Payload: 8
| emitting 8 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 48
| emitting length of ISAKMP Message: 76
| encrypting as INITIATOR, parent SA #1
| data before encryption:
|   00 00 00 08  01 00 00 00  00 01 02 03  04 05 06 07
| data after encryption:
|   ef 61 43 7e  20 c8 ff cc  28 2e 1d 57  52 43 96 41
| data being hmac:  8d 0e 0f 10  11 12 13 14  5d 73 ce 75  3d b1 db 6d
|   2e 20 25 08  00 00 00 02  00 00 00 4c  2a 00 00 30
|   8d 0e 0f 10  11 12 13 14  15 16 17 18  19 1a 1b 1c
|   ef 61 43 7e  20 c8 ff cc  28 2e 1d 57  52 43 96 41
| out calculated auth:
|   6a 62 0f cc  8a 03 02 70  19 cd 9e e2
sending 76 bytes for ikev2_delete_out through eth0:500 [93.184.216.35:500] to 132.213.238.7:500 (using #1)
|   8d 0e 0f 10  11 12 13 14  5d 73 ce 75  3d b1 db 6d
|   2e 20 25 08  00 00 00 02  00 00 00 4c  2a 00 00 30
|   8d 0e 0f 10  11 12 13 14  15 16 17 18  19 1a 1b 1c
|   ef 61 43 7e  20 c8 ff cc  28 2e 1d 57  52 43 96 41
|   6a 62 0f cc  8a 03 02 70  19 cd 9e e2
| pass 1: considering PARENT SAs to delete
./davecertI2 deleting state #1 (STATE_IKESA_DEL)
| considering request to delete IKE parent state
| now deleting the IKE (or parent) state
| removing state object #1
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  5d 73 ce 75  3d b1 db 6d
| state hash entry 15
./davecertI2 leak: request packet for informational exchange, item size: X
./davecertI2 leak: reply packet, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_prop, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: 4 * sa copy attrs array, item size: X
./davecertI2 leak: sa copy trans array, item size: X
./davecertI2 leak: sa copy prop array, item size: X
./davecertI2 leak: sa copy prop conj array, item size: X
./davecertI2 leak: sa copy prop_conj, item size: X
./davecertI2 leak: saved first received packet, item size: X
./davecertI2 leak: st_nr in duplicate_state, item size: X
./davecertI2 leak: st_ni in duplicate_state, item size: X
./davecertI2 leak: st_skey_pr in duplicate_state, item size: X
./davecertI2 leak: st_skey_pi in duplicate_state, item size: X
./davecertI2 leak: st_skey_er in duplicate_state, item size: X
./davecertI2 leak: st_skey_ei in duplicate_state, item size: X
./davecertI2 leak: st_skey_ar in duplicate_state, item size: X
./davecertI2 leak: st_skey_ai in duplicate_state, item size: X
./davecertI2 leak: st_skey_d in duplicate_state, item size: X
./davecertI2 leak: st_skeyseed in duplicate_state, item size: X
./davecertI2 leak: st_enc_key in duplicate_state, item size: X
./davecertI2 leak: struct state in new_state(), item size: X
./davecertI2 leak: calculated skey_prshared secret, item size: X
./davecertI2 leak: calculated skey_pishared secret, item size: X
./davecertI2 leak: calculated skey_ershared secret, item size: X
./davecertI2 leak: calculated skey_eishared secret, item size: X
./davecertI2 leak: calculated skey_arshared secret, item size: X
./davecertI2 leak: calculated skey_aishared secret, item size: X
./davecertI2 leak: calculated skey_dshared secret, item size: X
./davecertI2 leak: calculated sharedshared secret, item size: X
./davecertI2 leak: ikev2_inR1outI2 KE, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_prop, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: nonce, item size: X
./davecertI2 leak: Gr, item size: X
./davecertI2 leak: saved first packet, item size: X
./davecertI2 leak: sa in main_outI1, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_prop, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: initiator nonce, item size: X
./davecertI2 leak: long term secret, item size: X
./davecertI2 leak: saved gi value, item size: X
./davecertI2 leak: msg_digest, item size: X
./davecertI2 leak: ikev2_outI1 KE, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_prop, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: 12 * sa copy attrs array, item size: X
./davecertI2 leak: sa copy trans array, item size: X
./davecertI2 leak: sa copy prop array, item size: X
./davecertI2 leak: sa copy prop conj array, item size: X
./davecertI2 leak: sa copy prop_conj, item size: X
./davecertI2 leak: struct state in new_state(), item size: X
./davecertI2 leak: x509cert, item size: X
./davecertI2 leak: CA cert, item size: X
./davecertI2 leak: rfc3110 format of public key [created], item size: X
./davecertI2 leak: issuer dn, item size: X
./davecertI2 leak: keep id name, item size: X
./davecertI2 leak: pubkey entry, item size: X
./davecertI2 leak: pubkey, item size: X
./davecertI2 leak: certificate filename, item size: X
./davecertI2 leak: 2 * id list, item size: X
./davecertI2 leak: rfc3110 format of public key [created], item size: X
./davecertI2 leak: pubkey, item size: X
./davecertI2 leak: secret, item size: X
./davecertI2 leak: policies path, item size: X
./davecertI2 leak: ocspcerts path, item size: X
./davecertI2 leak: aacerts path, item size: X
./davecertI2 leak: certs path, item size: X
./davecertI2 leak: private path, item size: X
./davecertI2 leak: crls path, item size: X
./davecertI2 leak: cacert path, item size: X
./davecertI2 leak: acert path, item size: X
./davecertI2 leak: override ipsec.d, item size: X
./davecertI2 leak: 2 * hasher name, item size: X
./davecertI2 leak: policies path, item size: X
./davecertI2 leak: ocspcerts path, item size: X
./davecertI2 leak: aacerts path, item size: X
./davecertI2 leak: certs path, item size: X
./davecertI2 leak: private path, item size: X
./davecertI2 leak: crls path, item size: X
./davecertI2 leak: cacert path, item size: X
./davecertI2 leak: acert path, item size: X
./davecertI2 leak: default conf var_dir, item size: X
./davecertI2 leak: default conf conffile, item size: X
./davecertI2 leak: default conf ipsecd_dir, item size: X
./davecertI2 leak: default conf ipsec_conf_dir, item size: X
./davecertI2 leak detective found Z leaks, total size X
