./h2hR1 ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
./h2hR1 ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
./h2hR1 ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
./h2hR1 loading secrets from "../samples/jj.secrets"
./h2hR1 loaded private key for keyid: PPK_RSA:AQOg5H7A4/2A3A 92D4 E0FA 5CD7 8DE1 D133 0C62 6985 2B6E D701
| processing whack message of size: A
| processing whack message of size: A
processing whack msg time: X size: Y
./h2hR1 loaded key: 6DF7 E7A2 B017 2118 6525 1A9E FC30 F603 ADD5 6698
| processing whack message of size: A
processing whack msg time: X size: Y
./h2hR1 loaded key: AD2F DDF5 7ABE 6140 14AA B39E 50EB EC76 CA12 3C8C
| processing whack message of size: A
processing whack msg time: X size: Y
| Added new connection alttunnel with policy RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
./h2hR1 use keyid: 1:<> / 2:<>
| counting wild cards for 192.168.1.1 is 0
./h2hR1 use keyid: 1:<> / 2:<>
| counting wild cards for 132.213.238.7 is 0
| orient alttunnel checking against if: eth0 (AF_INET:132.213.238.7:4500)
| orient alttunnel checking against if: eth0 (AF_INET:132.213.238.7:500)
|     orient matched on IP
|   orient alttunnel finished with: 1 [132.213.238.7]
| find_host_pair: looking for me=132.213.238.7:500 %address him=192.168.1.1:500 exact-match
| find_host_pair: concluded with <none>
| connect_to_host_pair: 132.213.238.7:500 %address 192.168.1.1:500 -> hp:none
| find_ID_host_pair: looking for me=132.213.238.7 him=192.168.1.1 (exact)
|   concluded with <none>
./h2hR1 adding connection: "alttunnel"
| 132.213.238.7...192.168.1.1
| ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1; policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|   orient alttunnel finished with: 1 [132.213.238.7]
RC=0 "alttunnel": 132.213.238.7...192.168.1.1; unrouted; eroute owner: #0
RC=0 "alttunnel":     myip=unset; hisip=unset;
RC=0 "alttunnel":   ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1
RC=0 "alttunnel":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK; prio: 32,32; interface: eth0; kind=CK_PERMANENT
|   =========== input from pcap file h2hI1.pcap ========
| *received 428 bytes from 192.168.1.1:500 on eth0 (port=500)
|   80 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 01 ac  22 00 00 2c
|   00 00 00 28  01 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  28 00 01 08  00 0e 00 00
|   bf da ea a0  86 55 9f df  bf bb 5e 42  b9 a6 18 18
|   ab ca 13 b4  cf 6a 92 77  44 6c 57 46  1c 07 a0 86
|   44 e0 9c 5f  98 41 7c 4a  3b ab 6c 35  56 5a 63 cc
|   0b 2e 40 97  16 18 bf c0  83 55 57 cc  94 04 cd 6b
|   a2 f2 b9 a6  3b 9b 0d fd  73 7f 91 04  06 28 86 f9
|   cb 0b 8a 65  14 a0 f5 b2  ed 6b 23 1f  7d df 90 28
|   b8 0f 28 95  fb 00 22 c9  e3 8f b9 df  b8 7c 66 bc
|   75 1b c8 61  ba b5 93 17  d6 df 87 26  d3 4d 2d 0a
|   a4 80 e4 51  fd 38 fa 42  ca b5 f5 2d  90 80 be a4
|   9c 08 17 b6  ab a9 49 4c  f7 45 53 50  cb 49 f8 b4
|   44 50 86 91  37 f7 5c b0  4a ce 96 1f  fc 2a a5 16
|   e9 45 e4 f2  e5 f0 c9 81  c1 66 68 55  ed c9 3b 62
|   27 a9 34 0e  01 a8 54 63  7f 99 2f ea  6d 3a 21 4c
|   32 72 bf bb  85 df 2b 8e  cc a0 40 3e  96 16 fa 03
|   96 7f cd d7  d0 11 d0 17  89 96 cd 01  25 d3 3d dd
|   d2 5e 2c bd  2e 3a e4 97  b6 33 a3 5c  41 01 ed 8e
|   29 00 00 14  3c d5 15 14  50 ab 73 9a  c8 ac 54 1c
|   0d e6 bc 04  29 00 00 1c  00 00 40 04  ea 59 1e 1b
|   30 a3 e0 94  4c dc 91 5b  b0 95 3c 48  70 73 62 f1
|   2b 00 00 1c  00 00 40 05  cd bc 1b 74  02 d7 5e 4c
|   da 5b cd 1c  a1 08 87 2b  f9 7d c4 c2  00 00 00 10
|   4f 45 70 6c  75 74 6f 75  6e 69 74 30
|  processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34), msgid: 00000000
| I am IKE SA Responder
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| v2 state object not found
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| v2 state object not found
| considering state entry: 0
|   reject:state needed and state unavailable
| considering state entry: 1
|   reject:state needed and state unavailable
| considering state entry: 2
|   reject:state needed and state unavailable
| considering state entry: 3
| now proceed with state specific processing using state #3 responder-V2_init
| find_host_connection2 called from ikev2parent_inI1outR1, me=132.213.238.7:500 him=192.168.1.1:500 policy=IKEv2ALLOW/-
| find_host_pair: looking for me=132.213.238.7:500 %address him=192.168.1.1:500 any-match
| find_host_pair: comparing to me=132.213.238.7:500 %address him=192.168.1.1:500
| find_host_pair: concluded with alttunnel
| found_host_pair_conn (find_host_connection2): 132.213.238.7:500 %address/192.168.1.1:500 -> hp:alttunnel
| searching for connection with policy = IKEv2ALLOW/-
| found policy = RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK (alttunnel)
| find_host_connection2 returns alttunnel (ike=none/none)
./h2hR1 tentatively considering connection: alttunnel
| creating state object #1 at Z
| orient alttunnel checking against if: eth0 (AF_INET:132.213.238.7:4500)
| orient alttunnel checking against if: eth0 (AF_INET:132.213.238.7:500)
|     orient matched on IP
|   orient alttunnel finished with: 1 [132.213.238.7]
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
| inserting state object #1 bucket: 28
| will not send/process a dcookie
| received a notify..
| processor 'responder-V2_init' returned STF_SUSPEND (2)
| #1 complete v2 state transition with STF_SUSPEND
| ikev2 parent inI1outR1: calculated ke+nonce, sending R1
| nat chunk  80 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   c0 a8 01 01  01 f4
| processing v2N_NAT_DETECTION_SOURCE_IP
| received nat-t hash  ea 59 1e 1b  30 a3 e0 94  4c dc 91 5b  b0 95 3c 48
|   70 73 62 f1
| calculated nat-t  h  ea 59 1e 1b  30 a3 e0 94  4c dc 91 5b  b0 95 3c 48
|   70 73 62 f1
| nat-t payloads for v2N_NAT_DETECTION_SOURCE_IP match: no NAT
| nat chunk  80 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   84 d5 ee 07  01 f4
| processing v2N_NAT_DETECTION_DESTINATION_IP
| received nat-t hash  cd bc 1b 74  02 d7 5e 4c  da 5b cd 1c  a1 08 87 2b
|   f9 7d c4 c2
| calculated nat-t  h  cd bc 1b 74  02 d7 5e 4c  da 5b cd 1c  a1 08 87 2b
|   f9 7d c4 c2
| nat-t payloads for v2N_NAT_DETECTION_DESTINATION_IP match: no NAT
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   de bc 58 3a  8f 40 d0 cf
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_SA_INIT
|    flags: ISAKMP_FLAG_RESPONSE
|    message ID:  00 00 00 00
| ***emit IKEv2 Security Association Payload:
|    critical bit: none
| no IKE algorithms for this connection
| ****parse IKEv2 Proposal Substructure Payload:
|    length: 40
|    prop #: 1
|    proto ID: 1
|    spi size: 0
|    # transforms: 4
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 1
|    transform ID: 3
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 3
|    transform ID: 1
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 2
|    transform ID: 1
| *****parse IKEv2 Transform Substructure Payload:
|    length: 8
|    transform type: 4
|    transform ID: 14
| proposal 1 failed encr= (policy:aes-cbc vs offered:3des)
|             failed integ=(policy:auth-hmac-sha1-96 vs offered:auth-hmac-md5-96)
|             failed prf=  (policy:prf-hmac-sha1 vs offered:prf-hmac-md5)
|             succeeded dh=   (policy:OAKLEY_GROUP_MODP2048 vs offered:OAKLEY_GROUP_MODP2048)
| proposal 1 failed encr= (policy:aes-cbc vs offered:3des)
|             succeeded integ=(policy:auth-hmac-md5-96 vs offered:auth-hmac-md5-96)
|             succeeded prf=  (policy:prf-hmac-md5 vs offered:prf-hmac-md5)
|             succeeded dh=   (policy:OAKLEY_GROUP_MODP2048 vs offered:OAKLEY_GROUP_MODP2048)
| proposal 1 succeeded encr= (policy:3des vs offered:3des)
|             failed integ=(policy:auth-hmac-sha1-96 vs offered:auth-hmac-md5-96)
|             failed prf=  (policy:prf-hmac-sha1 vs offered:prf-hmac-md5)
|             succeeded dh=   (policy:OAKLEY_GROUP_MODP2048 vs offered:OAKLEY_GROUP_MODP2048)
| ****emit IKEv2 Proposal Substructure Payload:
|    prop #: 1
|    proto ID: 1
|    spi size: 0
|    # transforms: 4
| *****emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    transform type: 2
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    transform type: 4
|    transform ID: 14
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| emitting length of IKEv2 Security Association Payload: 44
| DH public value received:
|   bf da ea a0  86 55 9f df  bf bb 5e 42  b9 a6 18 18
|   ab ca 13 b4  cf 6a 92 77  44 6c 57 46  1c 07 a0 86
|   44 e0 9c 5f  98 41 7c 4a  3b ab 6c 35  56 5a 63 cc
|   0b 2e 40 97  16 18 bf c0  83 55 57 cc  94 04 cd 6b
|   a2 f2 b9 a6  3b 9b 0d fd  73 7f 91 04  06 28 86 f9
|   cb 0b 8a 65  14 a0 f5 b2  ed 6b 23 1f  7d df 90 28
|   b8 0f 28 95  fb 00 22 c9  e3 8f b9 df  b8 7c 66 bc
|   75 1b c8 61  ba b5 93 17  d6 df 87 26  d3 4d 2d 0a
|   a4 80 e4 51  fd 38 fa 42  ca b5 f5 2d  90 80 be a4
|   9c 08 17 b6  ab a9 49 4c  f7 45 53 50  cb 49 f8 b4
|   44 50 86 91  37 f7 5c b0  4a ce 96 1f  fc 2a a5 16
|   e9 45 e4 f2  e5 f0 c9 81  c1 66 68 55  ed c9 3b 62
|   27 a9 34 0e  01 a8 54 63  7f 99 2f ea  6d 3a 21 4c
|   32 72 bf bb  85 df 2b 8e  cc a0 40 3e  96 16 fa 03
|   96 7f cd d7  d0 11 d0 17  89 96 cd 01  25 d3 3d dd
|   d2 5e 2c bd  2e 3a e4 97  b6 33 a3 5c  41 01 ed 8e
|    next-payload: ISAKMP_NEXT_v2KE [@28=0x22]
| ***emit IKEv2 Key Exchange Payload:
|    critical bit: none
|    transform type: 14
| emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload
| ikev2 g^x  25 9a 4e 99  8d ac d9 7b  7d ad 9b 2a  bd 38 04 00
|   f7 71 32 4c  b0 95 5e 5c  c1 0b e2 92  80 c3 9f b5
|   30 9b f3 89  51 96 5b 75  c6 5b 85 1a  8f f3 2d 6a
|   b1 b9 66 fe  c5 2e a9 f4  9e e2 34 c3  d9 dd 47 17
|   18 90 fd ce  66 bd 6c e4  43 8a 74 49  1c 72 97 9f
|   d7 74 86 b1  82 7e 9f 17  82 5e 06 ba  d2 fd 71 7e
|   73 10 4b 8b  52 14 00 26  48 d2 59 2e  1c 89 3c bb
|   e7 e0 12 4a  cb 9b b4 06  45 ca df 18  ca 11 f3 28
|   68 35 09 9f  16 e5 14 33  ff a8 5c 28  ab 17 4b 29
|   3b 56 32 c7  53 ad 99 61  9c 56 f8 50  25 21 34 ab
|   2d b8 f0 ec  f9 23 ae 8c  b5 24 4d e0  e6 3e 29 d4
|   2e da b1 9c  6c 3b 1f 0b  bf ae be 6d  0f 58 c3 7a
|   95 be 9b 9f  8a e7 07 38  a6 54 e9 32  80 63 8c 60
|   b3 ed 8b 59  27 d3 03 7d  46 04 05 4c  6d d1 26 3c
|   4e 09 ea 63  e0 7a 6a 7a  a6 3d ed ac  39 8c bf 1f
|   de 9c d9 09  d2 a1 63 e1  28 12 5a 18  31 fb 82 ee
| emitting length of IKEv2 Key Exchange Payload: 264
|    next-payload: ISAKMP_NEXT_v2Ni [@72=0x28]
| ***emit IKEv2 Nonce Payload:
|    critical bit: none
| emitting 16 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload
| IKEv2 nonce  00 84 b6 7e  d1 b6 d1 52  89 0e d7 1c  74 b9 26 e4
| emitting length of IKEv2 Nonce Payload: 20
| nat chunk  80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   84 d5 ee 07  01 f4
| Adding a v2N Payload
|    next-payload: ISAKMP_NEXT_v2N [@336=0x29]
| ***emit IKEv2 Notify Payload:
|    critical bit: none
|    Protocol ID: PROTO_RESERVED
|    SPI size: 0
|    Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP
| emitting 20 raw bytes of Notify data into IKEv2 Notify Payload
| Notify data  1d 77 eb e3  db b6 db 7c  4b b5 ef 4b  57 c6 f1 b8
|   ec 7e 9b fe
| emitting length of IKEv2 Notify Payload: 28
| nat chunk  80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   c0 a8 01 01  01 f4
| Adding a v2N Payload
|    next-payload: ISAKMP_NEXT_v2N [@356=0x29]
| ***emit IKEv2 Notify Payload:
|    critical bit: none
|    Protocol ID: PROTO_RESERVED
|    SPI size: 0
|    Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP
| emitting 20 raw bytes of Notify data into IKEv2 Notify Payload
| Notify data  81 b5 74 15  c4 1e 64 b8  4c 1a 4e 9c  14 92 f7 ab
|   25 31 bf 62
| emitting length of IKEv2 Notify Payload: 28
|    next-payload: ISAKMP_NEXT_v2V [@384=0x2b]
| ***emit ISAKMP Vendor ID Payload:
| emitting 12 raw bytes of Vendor ID into ISAKMP Vendor ID Payload
| Vendor ID  4f 45 70 6c  75 74 6f 75  6e 69 74 30
| emitting length of ISAKMP Vendor ID Payload: 16
| emitting length of ISAKMP Message: 428
| #1 complete v2 state transition with STF_OK
./h2hR1 transition from state STATE_IKEv2_START to state STATE_PARENT_R1
| v2_state_transition: st is #1; pst is #0; transition_st is #1
./h2hR1 STATE_PARENT_R1: received v2I1, sent v2R1 (msgid: 00000000/00000000)
| sending reply packet to 192.168.1.1:500 (from port 500)
sending 428 bytes for STATE_IKEv2_START through eth0:500 [132.213.238.7:500] to 192.168.1.1:500 (using #1)
|   80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   21 20 22 20  00 00 00 00  00 00 01 ac  22 00 00 2c
|   00 00 00 28  01 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  28 00 01 08  00 0e 00 00
|   25 9a 4e 99  8d ac d9 7b  7d ad 9b 2a  bd 38 04 00
|   f7 71 32 4c  b0 95 5e 5c  c1 0b e2 92  80 c3 9f b5
|   30 9b f3 89  51 96 5b 75  c6 5b 85 1a  8f f3 2d 6a
|   b1 b9 66 fe  c5 2e a9 f4  9e e2 34 c3  d9 dd 47 17
|   18 90 fd ce  66 bd 6c e4  43 8a 74 49  1c 72 97 9f
|   d7 74 86 b1  82 7e 9f 17  82 5e 06 ba  d2 fd 71 7e
|   73 10 4b 8b  52 14 00 26  48 d2 59 2e  1c 89 3c bb
|   e7 e0 12 4a  cb 9b b4 06  45 ca df 18  ca 11 f3 28
|   68 35 09 9f  16 e5 14 33  ff a8 5c 28  ab 17 4b 29
|   3b 56 32 c7  53 ad 99 61  9c 56 f8 50  25 21 34 ab
|   2d b8 f0 ec  f9 23 ae 8c  b5 24 4d e0  e6 3e 29 d4
|   2e da b1 9c  6c 3b 1f 0b  bf ae be 6d  0f 58 c3 7a
|   95 be 9b 9f  8a e7 07 38  a6 54 e9 32  80 63 8c 60
|   b3 ed 8b 59  27 d3 03 7d  46 04 05 4c  6d d1 26 3c
|   4e 09 ea 63  e0 7a 6a 7a  a6 3d ed ac  39 8c bf 1f
|   de 9c d9 09  d2 a1 63 e1  28 12 5a 18  31 fb 82 ee
|   29 00 00 14  00 84 b6 7e  d1 b6 d1 52  89 0e d7 1c
|   74 b9 26 e4  29 00 00 1c  00 00 40 04  1d 77 eb e3
|   db b6 db 7c  4b b5 ef 4b  57 c6 f1 b8  ec 7e 9b fe
|   2b 00 00 1c  00 00 40 05  81 b5 74 15  c4 1e 64 b8
|   4c 1a 4e 9c  14 92 f7 ab  25 31 bf 62  00 00 00 10
|   4f 45 70 6c  75 74 6f 75  6e 69 74 30
./h2hR1 deleting state #1 (STATE_PARENT_R1)
| considering request to delete IKE parent state
| removing state object #1
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
./h2hR1 deleting connection
| pass 0: considering CHILD SAs to delete
| pass 1: considering PARENT SAs to delete
./h2hR1 leak: reply packet, item size: X
./h2hR1 leak: saved first packet, item size: X
./h2hR1 leak: initiator nonce, item size: X
./h2hR1 leak: long term secret, item size: X
./h2hR1 leak: saved gi value, item size: X
./h2hR1 leak: nonce, item size: X
./h2hR1 leak: Gi, item size: X
./h2hR1 leak: db_attrs, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: db_v2_prop, item size: X
./h2hR1 leak: db_attrs, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: db_attrs, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: db_attrs, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: db_attrs, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: db_attrs, item size: X
./h2hR1 leak: db_v2_trans, item size: X
./h2hR1 leak: db_v2_prop_conj, item size: X
./h2hR1 leak: 12 * sa copy attrs array, item size: X
./h2hR1 leak: sa copy trans array, item size: X
./h2hR1 leak: sa copy prop array, item size: X
./h2hR1 leak: sa copy prop conj array, item size: X
./h2hR1 leak: sa copy prop_conj, item size: X
./h2hR1 leak: saved first received packet, item size: X
./h2hR1 leak: ikev2_inI1outR1 KE, item size: X
./h2hR1 leak: struct state in new_state(), item size: X
./h2hR1 leak: msg_digest, item size: X
./h2hR1 leak: alg_info_ike, item size: X
./h2hR1 leak: policies path, item size: X
./h2hR1 leak: ocspcerts path, item size: X
./h2hR1 leak: aacerts path, item size: X
./h2hR1 leak: certs path, item size: X
./h2hR1 leak: private path, item size: X
./h2hR1 leak: crls path, item size: X
./h2hR1 leak: cacert path, item size: X
./h2hR1 leak: acert path, item size: X
./h2hR1 leak: default conf var_dir, item size: X
./h2hR1 leak: default conf conffile, item size: X
./h2hR1 leak: default conf ipsecd_dir, item size: X
./h2hR1 leak: default conf ipsec_conf_dir, item size: X
./h2hR1 leak: 2 * id list, item size: X
./h2hR1 leak: rfc3110 format of public key [created], item size: X
./h2hR1 leak: pubkey, item size: X
./h2hR1 leak: secret, item size: X
./h2hR1 leak: 2 * hasher name, item size: X
./h2hR1 leak detective found Z leaks, total size X
Pre-amble (offset: X): #!-pluto-whack-file- recorded on FOO
