
  Electric Fence 2.1 Copyright (C) 1987-1998 Bruce Perens.
../parentI2x509 adjusting ipsec.d to ../../../baseconfigs/west/etc/ipsec.d
../parentI2x509 ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
../parentI2x509 ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
../parentI2x509 ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
../parentI2x509 ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
../parentI2x509 ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
../parentI2x509 ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
../parentI2x509 ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
../parentI2x509 Changed path to directory '../../../baseconfigs/west/etc/ipsec.d/cacerts'
../parentI2x509   loaded CA cert file 'otherca.crt' (1428 bytes)
../parentI2x509   loaded CA cert file 'ca.crt' (1407 bytes)
../parentI2x509 loading secrets from "../../../baseconfigs/west/etc/ipsec.secrets"
../parentI2x509 loaded private key for keyid: PPK_RSA:AQNzGEFs1
../parentI2x509   loaded private key file '../../../baseconfigs/west/etc/ipsec.d/private/west.key' (963 bytes)
../parentI2x509 loaded private key for keyid: PPK_RSA:AwEAAbmpA
../parentI2x509 loading certificate from west.crt 
../parentI2x509   loaded host cert file './west.crt' (1704 bytes)
| interface "eth0" matched left side
../parentI2x509 added connection description "ikev2-westnet-eastnet-x509-cr"
RC=0 "ikev2-westnet-eastnet-x509-cr": 192.1.2.45<192.1.2.45>[C=ca, ST=Ontario, O=Xelerance, OU=Test Department, CN=west.testing.xelerance.com, E=testing@xelerance.com,S=C]...192.1.2.23<192.1.2.23>[C=ca, ST=Ontario, O=Xelerance, OU=Test Department, CN=east.testing.xelerance.com, E=testing@xelerance.com,S=C]; unrouted; eroute owner: #0
RC=0 "ikev2-westnet-eastnet-x509-cr":     myip=unset; hisip=unset; mycert=west.crt;
RC=0 "ikev2-westnet-eastnet-x509-cr":   CAs: 'C=ca, ST=Ontario, O=Xelerance, OU=Test Department, CN=Xelerance test CA for ca, E=testing@xelerance.com'...'%any'
RC=0 "ikev2-westnet-eastnet-x509-cr":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3
RC=0 "ikev2-westnet-eastnet-x509-cr":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init; prio: 32,32; interface: eth0; 
RC=0 "ikev2-westnet-eastnet-x509-cr":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
| interface "eth0" matched left side
| ICOOKIE:  00 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
../parentI2x509 initiating v2 parent SA
RC=133 STATE_PARENT_I1: initiate
sending 508 bytes for ikev2_parent_outI1_tail through eth0:500 to 192.1.2.23:500 (using #1)
|   00 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 01 fc  22 80 00 f4
|   02 00 00 28  01 01 00 04  03 00 00 08  01 00 00 0c
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  02 01 00 04
|   03 00 00 08  01 00 00 0c  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  03 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  04 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  05 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 02  00 00 00 28  06 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 02
|   28 00 00 c8  00 05 00 00  ff bc 6a 92  a6 b9 55 9b
|   05 fa 96 a7  a4 35 07 b4  c1 e1 c0 86  1a 58 71 d9
|   ba 73 a1 63  11 37 88 c0  de bb 39 79  e7 ff 0c 52
|   b4 ce 60 50  eb 05 36 9e  a4 30 0d 2b  ff 3b 1b 29
|   9f 3b 80 2c  cb 13 31 8c  2a b9 e3 b5  62 7c b4 b3
|   5e b9 39 98  20 76 b5 7c  05 0d 7b 35  c3 c5 c7 cc
|   8c 0f ea b7  b6 4a 7d 7b  6b 8f 6b 4d  ab f4 ac 40
|   6d d2 01 26  b9 0a 98 ac  76 6e fa 37  a7 89 0c 43
|   94 ff 9a 77  61 5b 58 f5  2d 65 1b bf  a5 8d 2a 54
|   9a f8 b0 1a  a4 bc a3 d7  62 42 66 63  b1 55 d4 eb
|   da 9f 60 a6  a1 35 73 e6  a8 88 13 5c  dc 67 3d d4
|   83 02 99 03  f3 a9 0e ca  23 e1 ec 1e  27 03 31 b2
|   d0 50 f4 f7  58 f4 99 27  2b 80 00 14  b5 ce 84 19
|   09 5c 6e 2b  6b 62 d3 05  53 05 b3 c4  00 00 00 10
|   4f 45 VENDOR
../parentI2x509 transition from state STATE_IKEv2_START to state STATE_PARENT_I1
../parentI2x509 STATE_PARENT_I1: sent v2I1, expected v2R1
| *received 308 bytes from 192.1.2.23:500 on eth0 (port=500)
|   00 01 02 03  04 05 06 07  c0 2e 7a 30  31 a0 31 88
|   21 20 22 20  00 00 00 00  00 00 01 34  22 80 00 2c
|   00 00 00 28  01 01 00 04  03 00 00 08  01 00 00 0c
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  28 00 00 c8  00 05 00 00
|   cd 30 df 6e  c0 85 44 12  53 01 80 d8  7e 1a fb b3
|   26 79 3e 99  56 c8 6a 96  25 53 c2 77  ad 5b ab 50
|   f8 32 5a d8  64 0b 0e fe  a5 1d 6c 83  1f a1 7c fb
|   0f 2e 1a f4  b1 66 a0 fe  30 75 12 ad  0f 81 ab b8
|   aa fb 68 48  ec 10 a4 97  6c 3d b1 17  ec e1 e6 61
|   db bf 48 0c  28 2e 3f 11  07 c1 86 42  80 1e e8 3f
|   9e 4a b9 ab  63 6f 23 7d  aa f6 a7 aa  d8 22 99 3e
|   a4 1e a3 31  ee 27 82 0b  93 f5 0b 8f  3f 71 05 61
|   c9 25 70 26  97 ba 6b 1e  95 3c 21 fb  c9 a7 7d 2b
|   5f 87 3c fc  50 99 e7 7d  48 4c dd 52  66 4b cf 0d
|   bf 00 ca fd  ae 6d e7 14  6d 11 35 f6  5d 93 5f 60
|   b9 73 0f e0  49 2c 2a f8  c9 04 f6 4c  59 16 90 9d
|   2b 80 00 14  47 e9 f9 25  8c a2 38 58  f6 75 b1 66
|   b0 2c c2 92  00 00 00 10  4f 45 70 6c  75 74 6f 75
|   6e 69 74 30
| **parse ISAKMP Message:
|    initiator cookie:
|   00 01 02 03  04 05 06 07
|    responder cookie:
|   c0 2e 7a 30  31 a0 31 88
|    next payload type: ISAKMP_NEXT_v2SA
|    ISAKMP version: IKEv2 version 2.0 (rfc4306)
|    exchange type: ISAKMP_v2_SA_INIT
|    flags: ISAKMP_FLAG_RESPONSE
|    message ID:  00 00 00 00
|    length: 308
|  processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34)
| ICOOKIE:  00 01 02 03  04 05 06 07
| RCOOKIE:  c0 2e 7a 30  31 a0 31 88
| state hash entry 30
| v2 state object not found
| ICOOKIE:  00 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| v2 peer and cookies match on #1
| v2 state object #1 found, in STATE_PARENT_I1
| ICOOKIE:  00 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| ICOOKIE:  00 01 02 03  04 05 06 07
| RCOOKIE:  c0 2e 7a 30  31 a0 31 88
| state hash entry 30
| ***parse IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2KE
|    critical bit: Payload-Critical
|    length: 44
| processing payload: ISAKMP_NEXT_v2SA (len=44) 
| ***parse IKEv2 Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_v2Ni
|    length: 200
|    transform type: 5
| processing payload: ISAKMP_NEXT_v2KE (len=200) 
| ***parse IKEv2 Nonce Payload:
|    next payload type: ISAKMP_NEXT_v2V
|    critical bit: Payload-Critical
|    length: 20
| processing payload: ISAKMP_NEXT_v2Ni (len=20) 
| ***parse IKEv2 Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    critical bit: Payload-Non-Critical
|    length: 16
| processing payload: ISAKMP_NEXT_v2V (len=16) 
| ikev2 parent inR1: calculating g^{xy} in order to send I2
| DH public value received:
|   cd 30 df 6e  c0 85 44 12  53 01 80 d8  7e 1a fb b3
|   26 79 3e 99  56 c8 6a 96  25 53 c2 77  ad 5b ab 50
|   f8 32 5a d8  64 0b 0e fe  a5 1d 6c 83  1f a1 7c fb
|   0f 2e 1a f4  b1 66 a0 fe  30 75 12 ad  0f 81 ab b8
|   aa fb 68 48  ec 10 a4 97  6c 3d b1 17  ec e1 e6 61
|   db bf 48 0c  28 2e 3f 11  07 c1 86 42  80 1e e8 3f
|   9e 4a b9 ab  63 6f 23 7d  aa f6 a7 aa  d8 22 99 3e
|   a4 1e a3 31  ee 27 82 0b  93 f5 0b 8f  3f 71 05 61
|   c9 25 70 26  97 ba 6b 1e  95 3c 21 fb  c9 a7 7d 2b
|   5f 87 3c fc  50 99 e7 7d  48 4c dd 52  66 4b cf 0d
|   bf 00 ca fd  ae 6d e7 14  6d 11 35 f6  5d 93 5f 60
|   b9 73 0f e0  49 2c 2a f8  c9 04 f6 4c  59 16 90 9d
| ****parse IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    length: 40
|    prop #: 1
|    proto ID: 1
|    spi size: 0
|    # transforms: 4
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    length: 8
|    transform type: 1
|    transform ID: 12
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    length: 8
|    transform type: 3
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    length: 8
|    transform type: 2
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    length: 8
|    transform type: 4
|    transform ID: 5
| ikev2 I 0x0001020304050607 0xc02e7a3031a03188 sha1:0x4ea8e662b07cdd430f6944c6723e4b82d5722418 aes128:0x3f44bf47cafd8150591deb088199fcbf
| ikev2 R 0x0001020304050607 0xc02e7a3031a03188 sha1:0x515b0bd22e6d76b34fdb760aa7bfad80b109b75d aes128:0xbedb67ec7dc3d00cccac42e70cd63bde
| duplicating state object #1
| creating state object #2 at ADDR
| ICOOKIE:  00 01 02 03  04 05 06 07
| RCOOKIE:  c0 2e 7a 30  31 a0 31 88
| state hash entry 30
| **emit ISAKMP Message:
|    initiator cookie:
|   00 01 02 03  04 05 06 07
|    responder cookie:
|   c0 2e 7a 30  31 a0 31 88
|    next payload type: ISAKMP_NEXT_v2E
|    ISAKMP version: IKEv2 version 2.0 (rfc4306)
|    exchange type: ISAKMP_v2_AUTH
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 01
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2IDi
|    critical bit: Payload-Critical
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
| IKEv2 thinking whether to send my certificate:
|  my policy has  RSASIG, the policy is : RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init
|  sendcert: CERT_ALWAYSSEND and I did not get a certificate request 
|  so send cert.
| *****emit IKEv2 Identification Payload:
|    next payload type: ISAKMP_NEXT_v2CERT
|    id_type: ID_DER_ASN1_DN
| emitting 155 raw bytes of my identity into IKEv2 Identification Payload
| my identity  30 81 98 31  0b 30 09 06  03 55 04 06  13 02 63 61
|   31 10 30 0e  06 03 55 04  08 13 07 4f  6e 74 61 72
|   69 6f 31 12  30 10 06 03  55 04 0a 13  09 58 65 6c
|   65 72 61 6e  63 65 31 18  30 16 06 03  55 04 0b 13
|   0f 54 65 73  74 20 44 65  70 61 72 74  6d 65 6e 74
|   31 23 30 21  06 03 55 04  03 13 1a 77  65 73 74 2e
|   74 65 73 74  69 6e 67 2e  78 65 6c 65  72 61 6e 63
|   65 2e 63 6f  6d 31 24 30  22 06 09 2a  86 48 86 f7
|   0d 01 09 01  16 15 74 65  73 74 69 6e  67 40 78 65
|   6c 65 72 61  6e 63 65 2e  63 6f 6d
| emitting length of IKEv2 Identification Payload: 163
| idhash calc pi  cc 07 97 44  b4 a3 4e 8a  0d 2f 27 8b  ee 06 6d 07
|   a5 a5 75 2e
| idhash calc I2  09 00 00 00  30 81 98 31  0b 30 09 06  03 55 04 06
|   13 02 63 61  31 10 30 0e  06 03 55 04  08 13 07 4f
|   6e 74 61 72  69 6f 31 12  30 10 06 03  55 04 0a 13
|   09 58 65 6c  65 72 61 6e  63 65 31 18  30 16 06 03
|   55 04 0b 13  0f 54 65 73  74 20 44 65  70 61 72 74
|   6d 65 6e 74  31 23 30 21  06 03 55 04  03 13 1a 77
|   65 73 74 2e  74 65 73 74  69 6e 67 2e  78 65 6c 65
|   72 61 6e 63  65 2e 63 6f  6d 31 24 30  22 06 09 2a
|   86 48 86 f7  0d 01 09 01  16 15 74 65  73 74 69 6e
|   67 40 78 65  6c 65 72 61  6e 63 65 2e  63 6f 6d
| thinking! to send a CERTREQ or not
|   my policy is : RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init
|  my next payload will not be a certificate request
| I did not send a certificate request because
|   no known CA for the other end
| I am sending my cert
| *****emit IKEv2 Certificate Payload:
|    next payload type: ISAKMP_NEXT_v2AUTH
|    critical bit: Payload-Non-Critical
|    ikev2 cert encoding: CERT_X509_SIGNATURE
| emitting 1216 raw bytes of CERT into IKEv2 Certificate Payload
| CERT  30 82 04 bc  30 82 04 25  a0 03 02 01  02 02 01 02
|   30 0d 06 09  2a 86 48 86  f7 0d 01 01  04 05 00 30
|   81 96 31 0b  30 09 06 03  55 04 06 13  02 63 61 31
|   10 30 0e 06  03 55 04 08  13 07 4f 6e  74 61 72 69
|   6f 31 12 30  10 06 03 55  04 0a 13 09  58 65 6c 65
|   72 61 6e 63  65 31 18 30  16 06 03 55  04 0b 13 0f
|   54 65 73 74  20 44 65 70  61 72 74 6d  65 6e 74 31
|   21 30 1f 06  03 55 04 03  13 18 58 65  6c 65 72 61
|   6e 63 65 20  74 65 73 74  20 43 41 20  66 6f 72 20
|   63 61 31 24  30 22 06 09  2a 86 48 86  f7 0d 01 09
|   01 16 15 74  65 73 74 69  6e 67 40 78  65 6c 65 72
|   61 6e 63 65  2e 63 6f 6d  30 1e 17 0d  30 38 30 31
|   33 30 30 30  30 30 30 30  5a 17 0d 31  32 30 32 30
|   33 30 30 30  30 30 30 5a  30 81 98 31  0b 30 09 06
|   03 55 04 06  13 02 63 61  31 10 30 0e  06 03 55 04
|   08 13 07 4f  6e 74 61 72  69 6f 31 12  30 10 06 03
|   55 04 0a 13  09 58 65 6c  65 72 61 6e  63 65 31 18
|   30 16 06 03  55 04 0b 13  0f 54 65 73  74 20 44 65
|   70 61 72 74  6d 65 6e 74  31 23 30 21  06 03 55 04
|   03 13 1a 77  65 73 74 2e  74 65 73 74  69 6e 67 2e
|   78 65 6c 65  72 61 6e 63  65 2e 63 6f  6d 31 24 30
|   22 06 09 2a  86 48 86 f7  0d 01 09 01  16 15 74 65
|   73 74 69 6e  67 40 78 65  6c 65 72 61  6e 63 65 2e
|   63 6f 6d 30  81 9f 30 0d  06 09 2a 86  48 86 f7 0d
|   01 01 01 05  00 03 81 8d  00 30 81 89  02 81 81 00
|   ca c7 0f c1  05 40 b0 fc  48 ee 07 f0  67 2c d9 8f
|   36 e4 b6 b7  51 e5 e6 cd  a1 8c 34 be  92 b1 8a 08
|   94 4d e9 4a  d7 01 78 39  7e 2b d8 9b  7f af 4f 6b
|   64 95 b1 ef  a2 0c 0b 2b  a3 c3 68 3c  98 9e eb 6f
|   2a 22 ad 3c  d2 32 09 e3  4f 82 4f 86  64 c2 44 46
|   ae 89 98 45  39 a2 5e 38  f7 90 57 81  da 0a 22 d6
|   01 07 46 4c  86 8b 65 77  1a 0c b2 5b  14 0a 0d 32
|   7b 88 61 b1  fb 90 97 7a  d6 38 b9 58  c9 d9 e2 39
|   02 03 01 00  01 a3 82 02  14 30 82 02  10 30 09 06
|   03 55 1d 13  04 02 30 00  30 81 b1 06  03 55 1d 1f
|   04 81 a9 30  81 a6 30 2c  a0 2a a0 28  86 26 68 74
|   74 70 3a 2f  2f 63 65 72  74 73 2e 78  65 6c 65 72
|   61 6e 63 65  2e 63 6f 6d  2f 72 65 76  6f 6b 65 64
|   2e 63 72 6c  30 76 a0 74  a0 72 86 70  6c 64 61 70
|   3a 2f 2f 63  65 72 74 73  2e 78 65 6c  65 72 61 6e
|   63 65 2e 63  6f 6d 2f 6f  3d 58 65 6c  65 72 61 6e
|   63 65 2c 20  63 3d 43 41  3f 63 65 72  74 69 66 69
|   63 61 74 65  52 65 76 6f  63 61 74 69  6f 6e 4c 69
|   73 74 3f 62  61 73 65 3f  28 6f 62 6a  65 63 74 43
|   6c 61 73 73  3d 63 65 72  74 69 66 69  63 61 74 69
|   6f 6e 41 75  74 68 6f 72  69 74 79 29  30 0b 06 03
|   55 1d 0f 04  04 03 02 05  e0 30 27 06  03 55 1d 25
|   04 20 30 1e  06 08 2b 06  01 05 05 07  03 02 06 08
|   2b 06 01 05  05 07 03 01  06 08 2b 06  01 05 05 07
|   03 03 30 2c  06 09 60 86  48 01 86 f8  42 01 0d 04
|   1f 16 1d 4f  70 65 6e 53  53 4c 20 47  65 6e 65 72
|   61 74 65 64  20 43 65 72  74 69 66 69  63 61 74 65
|   30 1d 06 03  55 1d 0e 04  16 04 14 3f  0e 79 ee b6
|   c7 cb 65 43  6f a4 e1 51  79 09 a6 14  4d 5d 3b 30
|   81 cb 06 03  55 1d 23 04  81 c3 30 81  c0 80 14 45
|   d7 61 cd 80  1a 9c 73 9a  c9 25 b7 a5  9d db 9a 55
|   5a 1b 04 a1  81 9c a4 81  99 30 81 96  31 0b 30 09
|   06 03 55 04  06 13 02 63  61 31 10 30  0e 06 03 55
|   04 08 13 07  4f 6e 74 61  72 69 6f 31  12 30 10 06
|   03 55 04 0a  13 09 58 65  6c 65 72 61  6e 63 65 31
|   18 30 16 06  03 55 04 0b  13 0f 54 65  73 74 20 44
|   65 70 61 72  74 6d 65 6e  74 31 21 30  1f 06 03 55
|   04 03 13 18  58 65 6c 65  72 61 6e 63  65 20 74 65
|   73 74 20 43  41 20 66 6f  72 20 63 61  31 24 30 22
|   06 09 2a 86  48 86 f7 0d  01 09 01 16  15 74 65 73
|   74 69 6e 67  40 78 65 6c  65 72 61 6e  63 65 2e 63
|   6f 6d 82 09  00 bb 38 7f  63 31 90 8b  41 30 0d 06
|   09 2a 86 48  86 f7 0d 01  01 04 05 00  03 81 81 00
|   99 1b 58 cc  f9 81 88 cc  17 56 eb ea  f6 b3 61 c9
|   14 74 94 03  8f a4 b1 42  a4 80 4b 4a  29 0d 65 4f
|   96 76 e4 3e  4b ad 2e d2  c0 3c 91 02  e1 93 4e b6
|   26 31 6d e4  87 71 52 84  af 29 d8 a8  d7 e4 0a 05
|   88 a9 f3 2c  45 4f 5c c8  f9 18 4d 0a  5a bd a4 99
|   ef 88 c4 16  55 4d 8d fc  d3 e7 61 bf  18 d8 75 b6
|   ee 04 e7 51  e2 cd aa 61  e3 b2 48 6d  0e 65 37 fd
|   bc 30 15 d3  35 42 81 52  2c 36 aa 0e  5c 55 70 54
| emitting length of IKEv2 Certificate Payload: 1221
| *****emit IKEv2 Authentication Payload:
|    next payload type: ISAKMP_NEXT_v2SA
|    auth method: v2_AUTH_RSA
| emitting 192 zero bytes of fake rsa sig into IKEv2 Authentication Payload
| emitting length of IKEv2 Authentication Payload: 200
| empty esp_info, returning defaults
| *****emit IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2TSi
|    critical bit: Payload-Critical
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_P
|    prop #: 1
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 12
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_P
|    prop #: 2
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 12
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_P
|    prop #: 3
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    prop #: 4
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| emitting length of IKEv2 Security Association Payload: 148
| *****emit IKEv2 Traffic Selectors:
|    next payload type: ISAKMP_NEXT_v2TSr
|    number of TS: 1
| ******emit IKEv2 Traffic Selectors:
|    TS type: ID_IPV4_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selectors
| ipv4 low  c0 01 02 2d
| emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selectors
| ipv4 high  c0 01 02 2d
| emitting length of IKEv2 Traffic Selectors: 16
| emitting length of IKEv2 Traffic Selectors: 24
| *****emit IKEv2 Traffic Selectors:
|    next payload type: ISAKMP_NEXT_NONE
|    number of TS: 1
| ******emit IKEv2 Traffic Selectors:
|    TS type: ID_IPV4_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selectors
| ipv4 low  c0 01 02 17
| emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selectors
| ipv4 high  c0 01 02 17
| emitting length of IKEv2 Traffic Selectors: 16
| emitting length of IKEv2 Traffic Selectors: 24
| emitting 12 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07  08 09 0a 0b
| emitting 12 zero bytes of 96-bits of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 1824
| emitting length of ISAKMP Message: 1852
| data before encryption:
|   25 00 00 a3  09 00 00 00  30 81 98 31  0b 30 09 06
|   03 55 04 06  13 02 63 61  31 10 30 0e  06 03 55 04
|   08 13 07 4f  6e 74 61 72  69 6f 31 12  30 10 06 03
|   55 04 0a 13  09 58 65 6c  65 72 61 6e  63 65 31 18
|   30 16 06 03  55 04 0b 13  0f 54 65 73  74 20 44 65
|   70 61 72 74  6d 65 6e 74  31 23 30 21  06 03 55 04
|   03 13 1a 77  65 73 74 2e  74 65 73 74  69 6e 67 2e
|   78 65 6c 65  72 61 6e 63  65 2e 63 6f  6d 31 24 30
|   22 06 09 2a  86 48 86 f7  0d 01 09 01  16 15 74 65
|   73 74 69 6e  67 40 78 65  6c 65 72 61  6e 63 65 2e
|   63 6f 6d 27  00 04 c5 04  30 82 04 bc  30 82 04 25
|   a0 03 02 01  02 02 01 02  30 0d 06 09  2a 86 48 86
|   f7 0d 01 01  04 05 00 30  81 96 31 0b  30 09 06 03
|   55 04 06 13  02 63 61 31  10 30 0e 06  03 55 04 08
|   13 07 4f 6e  74 61 72 69  6f 31 12 30  10 06 03 55
|   04 0a 13 09  58 65 6c 65  72 61 6e 63  65 31 18 30
|   16 06 03 55  04 0b 13 0f  54 65 73 74  20 44 65 70
|   61 72 74 6d  65 6e 74 31  21 30 1f 06  03 55 04 03
|   13 18 58 65  6c 65 72 61  6e 63 65 20  74 65 73 74
|   20 43 41 20  66 6f 72 20  63 61 31 24  30 22 06 09
|   2a 86 48 86  f7 0d 01 09  01 16 15 74  65 73 74 69
|   6e 67 40 78  65 6c 65 72  61 6e 63 65  2e 63 6f 6d
|   30 1e 17 0d  30 38 30 31  33 30 30 30  30 30 30 30
|   5a 17 0d 31  32 30 32 30  33 30 30 30  30 30 30 5a
|   30 81 98 31  0b 30 09 06  03 55 04 06  13 02 63 61
|   31 10 30 0e  06 03 55 04  08 13 07 4f  6e 74 61 72
|   69 6f 31 12  30 10 06 03  55 04 0a 13  09 58 65 6c
|   65 72 61 6e  63 65 31 18  30 16 06 03  55 04 0b 13
|   0f 54 65 73  74 20 44 65  70 61 72 74  6d 65 6e 74
|   31 23 30 21  06 03 55 04  03 13 1a 77  65 73 74 2e
|   74 65 73 74  69 6e 67 2e  78 65 6c 65  72 61 6e 63
|   65 2e 63 6f  6d 31 24 30  22 06 09 2a  86 48 86 f7
|   0d 01 09 01  16 15 74 65  73 74 69 6e  67 40 78 65
|   6c 65 72 61  6e 63 65 2e  63 6f 6d 30  81 9f 30 0d
|   06 09 2a 86  48 86 f7 0d  01 01 01 05  00 03 81 8d
|   00 30 81 89  02 81 81 00  ca c7 0f c1  05 40 b0 fc
|   48 ee 07 f0  67 2c d9 8f  36 e4 b6 b7  51 e5 e6 cd
|   a1 8c 34 be  92 b1 8a 08  94 4d e9 4a  d7 01 78 39
|   7e 2b d8 9b  7f af 4f 6b  64 95 b1 ef  a2 0c 0b 2b
|   a3 c3 68 3c  98 9e eb 6f  2a 22 ad 3c  d2 32 09 e3
|   4f 82 4f 86  64 c2 44 46  ae 89 98 45  39 a2 5e 38
|   f7 90 57 81  da 0a 22 d6  01 07 46 4c  86 8b 65 77
|   1a 0c b2 5b  14 0a 0d 32  7b 88 61 b1  fb 90 97 7a
|   d6 38 b9 58  c9 d9 e2 39  02 03 01 00  01 a3 82 02
|   14 30 82 02  10 30 09 06  03 55 1d 13  04 02 30 00
|   30 81 b1 06  03 55 1d 1f  04 81 a9 30  81 a6 30 2c
|   a0 2a a0 28  86 26 68 74  74 70 3a 2f  2f 63 65 72
|   74 73 2e 78  65 6c 65 72  61 6e 63 65  2e 63 6f 6d
|   2f 72 65 76  6f 6b 65 64  2e 63 72 6c  30 76 a0 74
|   a0 72 86 70  6c 64 61 70  3a 2f 2f 63  65 72 74 73
|   2e 78 65 6c  65 72 61 6e  63 65 2e 63  6f 6d 2f 6f
|   3d 58 65 6c  65 72 61 6e  63 65 2c 20  63 3d 43 41
|   3f 63 65 72  74 69 66 69  63 61 74 65  52 65 76 6f
|   63 61 74 69  6f 6e 4c 69  73 74 3f 62  61 73 65 3f
|   28 6f 62 6a  65 63 74 43  6c 61 73 73  3d 63 65 72
|   74 69 66 69  63 61 74 69  6f 6e 41 75  74 68 6f 72
|   69 74 79 29  30 0b 06 03  55 1d 0f 04  04 03 02 05
|   e0 30 27 06  03 55 1d 25  04 20 30 1e  06 08 2b 06
|   01 05 05 07  03 02 06 08  2b 06 01 05  05 07 03 01
|   06 08 2b 06  01 05 05 07  03 03 30 2c  06 09 60 86
|   48 01 86 f8  42 01 0d 04  1f 16 1d 4f  70 65 6e 53
|   53 4c 20 47  65 6e 65 72  61 74 65 64  20 43 65 72
|   74 69 66 69  63 61 74 65  30 1d 06 03  55 1d 0e 04
|   16 04 14 3f  0e 79 ee b6  c7 cb 65 43  6f a4 e1 51
|   79 09 a6 14  4d 5d 3b 30  81 cb 06 03  55 1d 23 04
|   81 c3 30 81  c0 80 14 45  d7 61 cd 80  1a 9c 73 9a
|   c9 25 b7 a5  9d db 9a 55  5a 1b 04 a1  81 9c a4 81
|   99 30 81 96  31 0b 30 09  06 03 55 04  06 13 02 63
|   61 31 10 30  0e 06 03 55  04 08 13 07  4f 6e 74 61
|   72 69 6f 31  12 30 10 06  03 55 04 0a  13 09 58 65
|   6c 65 72 61  6e 63 65 31  18 30 16 06  03 55 04 0b
|   13 0f 54 65  73 74 20 44  65 70 61 72  74 6d 65 6e
|   74 31 21 30  1f 06 03 55  04 03 13 18  58 65 6c 65
|   72 61 6e 63  65 20 74 65  73 74 20 43  41 20 66 6f
|   72 20 63 61  31 24 30 22  06 09 2a 86  48 86 f7 0d
|   01 09 01 16  15 74 65 73  74 69 6e 67  40 78 65 6c
|   65 72 61 6e  63 65 2e 63  6f 6d 82 09  00 bb 38 7f
|   63 31 90 8b  41 30 0d 06  09 2a 86 48  86 f7 0d 01
|   01 04 05 00  03 81 81 00  99 1b 58 cc  f9 81 88 cc
|   17 56 eb ea  f6 b3 61 c9  14 74 94 03  8f a4 b1 42
|   a4 80 4b 4a  29 0d 65 4f  96 76 e4 3e  4b ad 2e d2
|   c0 3c 91 02  e1 93 4e b6  26 31 6d e4  87 71 52 84
|   af 29 d8 a8  d7 e4 0a 05  88 a9 f3 2c  45 4f 5c c8
|   f9 18 4d 0a  5a bd a4 99  ef 88 c4 16  55 4d 8d fc
|   d3 e7 61 bf  18 d8 75 b6  ee 04 e7 51  e2 cd aa 61
|   e3 b2 48 6d  0e 65 37 fd  bc 30 15 d3  35 42 81 52
|   2c 36 aa 0e  5c 55 70 54  21 00 00 c8  01 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   2c 80 00 94  02 00 00 24  01 03 04 03  12 34 56 78
|   03 00 00 08  01 00 00 0c  03 00 00 08  03 00 00 02
|   00 00 00 08  05 00 00 00  02 00 00 24  02 03 04 03
|   12 34 56 78  03 00 00 08  01 00 00 0c  03 00 00 08
|   03 00 00 02  00 00 00 08  05 00 00 00  02 00 00 24
|   03 03 04 03  12 34 56 78  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  00 00 00 08  05 00 00 00
|   00 00 00 24  04 03 04 03  12 34 56 78  03 00 00 08
|   01 00 00 03  03 00 00 08  03 00 00 02  00 00 00 08
|   05 00 00 00  2d 00 00 18  01 00 00 00  07 00 00 10
|   00 00 ff ff  c0 01 02 2d  c0 01 02 2d  00 00 00 18
|   01 00 00 00  07 00 00 10  00 00 ff ff  c0 01 02 17
|   c0 01 02 17  00 01 02 03  04 05 06 07  08 09 0a 0b
| data after encryption:
|   52 89 67 16  e9 8d 47 58  74 5c 54 fb  14 2f 59 6a
|   75 23 a4 3c  57 a6 a4 3e  ea a0 d1 e5  8a 30 00 e6
|   82 98 2f 39  cf 00 bc 04  36 49 f5 63  e7 88 c7 69
|   74 32 b9 33  84 db 13 10  f4 e9 8a fe  a4 35 4d a2
|   41 8b ce e1  6a 9b 9b a3  fa fd 7c 7d  12 98 50 88
|   b5 61 50 66  ef 62 4c 41  68 a8 d4 7c  9e fe b5 86
|   cf ad fb d2  8c 9b 05 11  16 f0 ba dc  1a c3 42 ee
|   8c 78 96 97  d3 19 e8 d4  94 8a 4c 7f  6e c6 bf ff
|   9c 8b 36 27  c1 cf 76 4b  72 30 30 36  f2 ca 62 35
|   bd 36 b3 ef  ca c7 b5 ea  f0 72 2a f6  87 2b 54 00
|   c4 bb 77 89  86 de 0e e6  4f f1 4a 0e  34 d7 58 dd
|   bf bc 06 79  1d fa d9 c9  4b ae 15 b1  bc 26 12 90
|   cf 07 5f d5  03 cd 4a 10  04 05 1e 9e  84 ff 0c 05
|   dc 82 6e cb  69 cb 84 5b  1e 6f 95 49  7b 52 b3 b0
|   2a 00 dc 64  5c d1 ec 3a  07 ea d4 8d  7e 9b de e7
|   6c c3 2d 05  9e 27 de f9  3b c3 9a 5c  8f 2e 83 fc
|   23 ce 36 2c  96 56 98 e5  2d 28 f8 ec  ae c0 6e 19
|   2c 02 7d 26  b3 2c 6b 5f  8c ef 4b 26  09 0c 95 28
|   76 76 f9 1d  8b b7 98 e8  84 6c 6c fe  ce cc 1d c0
|   f8 9c 02 74  a0 99 52 3b  96 2b ff 91  63 26 a4 e0
|   a5 7e a7 db  d2 c2 9a 24  4b d1 e9 cc  23 4e d6 75
|   55 0c 0d 3a  1d cd 2c 23  56 82 05 c3  3e 87 45 d4
|   95 b4 e2 07  0c 87 e8 0d  be 47 b8 99  a3 99 fc f3
|   a9 c2 c5 6e  cc 32 d5 a9  5a ff 25 e8  9d 9f de b4
|   70 20 e9 b6  60 7b 22 a9  13 18 f8 fd  82 ba 4b c6
|   c6 55 20 6b  ac e1 6c f1  09 06 d4 bd  d5 96 51 ee
|   6d b4 1f 39  08 4b dc 41  bc 15 d9 7e  a5 c5 be 26
|   69 81 bf ee  9e ee b2 b3  9a 20 fa 65  d6 e4 b6 4d
|   45 95 44 e8  48 6f fc 06  5c 64 f5 2c  f1 3f 1b a4
|   d0 b7 4b 4d  d1 6d c8 07  0e dc d7 2c  18 59 dd ab
|   31 a2 6a c8  8f bf 81 32  9f 26 e5 7c  a6 c9 d9 d9
|   51 23 95 a5  fb bb 01 de  4a e3 92 b4  b7 47 7b 30
|   aa c6 18 c1  a6 01 df 0f  4a 48 34 3f  f8 22 d6 b8
|   05 d4 f1 42  b7 98 84 a1  36 5b d5 92  ae 93 0a f1
|   3d 58 86 9a  55 aa 28 80  35 87 8d 5d  51 8a bd 0c
|   ec 1d 5c f5  48 eb 99 33  28 66 70 9d  77 2d 9d cf
|   4d 88 02 4d  e4 f2 2f 2c  4c 18 fb 7c  58 60 1f a9
|   41 06 b2 43  8c 28 cb 62  98 bb 72 7c  64 be 17 96
|   16 67 2e 96  0b d4 b3 9c  79 64 2e 3e  17 03 73 ab
|   cc 2c 82 b5  e0 66 a2 3c  a3 6b 1d c8  98 fe 40 7a
|   dd 73 50 9a  30 ad db 60  61 ba de 8d  2f 83 d0 ad
|   9e e6 87 a2  1f 9c 87 08  c2 ec e6 57  b7 c5 ca 4d
|   57 a7 65 d2  a2 d7 89 08  05 ff 52 39  c9 5f 65 9b
|   83 21 7b 3c  3b cb 89 cf  62 95 ca d3  a4 0c d3 a6
|   8e f7 77 ee  7e 50 db be  13 04 cf 25  c8 7b 4b 7d
|   23 7f 2c 76  4c 08 0e 50  ff 9c f1 27  0a 57 7b b0
|   7b b2 19 2c  c2 e0 17 35  9e f1 55 72  26 3c 40 f1
|   9b 87 03 c2  44 2e d2 e4  fd 91 f8 f3  e9 c0 78 1b
|   cb 66 b5 3f  4c 59 14 d2  ca c9 7e be  6d bb 64 a2
|   46 7a af a6  e6 e1 28 3f  f9 f7 80 4e  80 94 95 07
|   b4 c8 1a e0  ef 5b af fe  03 5f 4a bc  85 66 8c da
|   bd ee a5 20  b3 b9 d5 d7  c8 00 1e 30  77 77 49 13
|   a7 aa f6 6d  8a b9 7d 49  9b 74 1e 65  37 bf 98 7d
|   71 8d 7e 48  ea 5e 23 d0  8a 44 d3 6a  d1 32 48 40
|   84 5b 81 a7  1c 7b 5b d8  36 98 10 95  3a 51 10 f9
|   b8 88 ba 40  9d 66 ea 81  ec d5 6e 56  66 de bd 14
|   db 81 d4 43  0f d5 cc b6  1f cf 48 51  a1 c8 1b f3
|   aa 50 be 91  cc 72 57 4a  70 a4 21 d5  22 79 04 a8
|   fe 9a 52 b3  1d df 11 dd  9a a3 39 96  67 22 8c 4a
|   f0 0d b3 4a  8e be 48 b1  12 67 72 7d  c8 9d 75 da
|   ee eb ef 9b  97 36 0f 9c  d0 e5 1a 15  a0 54 fb 96
|   6f 52 8a 5a  21 d7 c2 10  dd fb 8a 31  73 40 3e 00
|   6f 44 10 7f  8c 29 ef 46  03 1f bb 5e  90 a6 e2 93
|   c4 3e 62 22  b7 7c b1 81  f1 f2 83 17  0e a0 14 c3
|   69 7e e6 7c  95 fe 5d 4e  1e 80 0f 3c  9c d0 51 2f
|   74 d5 74 b5  5e fc 83 fc  29 ed f8 c3  06 fc da a8
|   a6 86 1d 03  b7 1b 90 41  9d 75 8a 52  07 82 dd 63
|   60 42 4a 58  fd d4 14 6a  51 9a 4d c6  e2 02 9f aa
|   03 37 60 98  ad 21 bd 3e  8a b4 28 84  b7 dd 88 f9
|   1a 55 60 8a  41 f8 fd bb  c2 c5 97 97  27 81 a8 73
|   3c e6 25 0f  78 db 51 ec  5f 09 21 62  2f 79 b9 6a
|   d9 15 72 e8  89 ac dc 7e  df 7c 21 06  d9 5e 64 df
|   14 dc 21 15  99 da c3 b0  b2 6b 04 38  ad 31 da cc
|   59 bc ff 43  22 b5 32 c0  20 6b 2a b6  2a 3e 4f d0
|   e8 6a 0d 6f  10 54 32 c6  2b 7a b9 11  8e d7 b9 13
|   5d 28 fb 0f  c5 3e 78 a8  4d 18 95 2b  85 c0 74 5a
|   3d 3b d8 b7  6e fe 16 9a  d4 63 d1 32  33 cd 22 dd
|   ab b1 4f 8c  9b 3b 4d 6a  d1 ea 0f c3  ee 01 31 51
|   6d 2f 14 f0  e6 13 4b 1d  cb e1 81 d0  15 e7 b9 b3
|   70 a5 f4 32  22 24 ff b4  ad 72 c5 c6  5b 50 04 63
|   bb e9 29 44  7b 77 fe 1b  14 1a d5 b1  b8 96 85 78
|   3d 74 a5 bc  09 8a f7 51  08 23 73 9d  a4 ff 57 dd
|   e5 7a e0 33  5c c7 3a ef  3f 66 65 36  9b de 6a db
|   7f 2c 03 28  86 67 5b 89  5a ba 58 bb  2a 83 f8 4f
|   f6 90 d3 37  20 b7 3d 40  20 d1 f7 4a  b0 1e d3 36
|   ae fa 53 e0  43 4a 43 ac  48 0f 99 82  4f 21 89 4f
|   d7 8b 3b fd  a8 8b db 96  f5 3e d6 f2  56 ce da be
|   eb a0 3c b6  05 69 a8 bf  a2 a5 d0 2b  1f ad d8 a0
|   3c d8 40 f4  d8 4d 6b c7  ec 30 33 24  67 63 64 92
|   4a fb 51 0c  1e bf d3 0e  82 e1 df 38  b2 41 31 47
|   d4 8d 79 c4  68 ae 77 f5  26 19 54 dc  31 8c 27 cb
|   b6 33 8c 58  63 f3 1a 5a  0f 52 0d 02  43 12 b1 6a
|   eb 1a b6 ad  4e d2 d2 2d  76 29 9b 45  8d f6 21 e6
|   43 62 f3 5c  a0 9a 41 b5  44 b8 e1 9f  82 49 8a 1a
|   a2 f3 8d 55  b8 35 44 93  8e 57 49 62  db 7a 7d f6
|   30 83 48 f1  3c ec ce e0  e1 75 c0 c7  24 ec 03 07
|   65 cb f3 ad  24 2e 51 b6  60 98 00 43  ea 6e 16 28
|   a2 19 44 b2  2a 24 59 f0  21 a8 a5 f9  56 49 9b 5e
|   68 83 65 28  1b 7f 80 79  07 c5 a4 b5  b3 98 fd 7f
|   1a e2 3f 81  c3 34 a0 94  7d 94 eb 39  ce 6f d4 85
|   61 6a be 19  b7 6e 11 36  2e 2c b1 8f  ff 5b 2d 84
|   1f ff 10 ec  2e b6 96 f0  ec 67 13 71  1f c2 8e 47
|   90 8b a8 3a  20 23 1d 7f  f8 e8 ca 8f  54 35 93 15
|   93 d2 d6 a2  0f 85 78 9c  e5 16 5e 29  92 4a 66 41
|   95 ed 5f 5f  21 ac a6 59  d4 f1 f2 d2  40 6e 25 8a
|   34 40 b0 b1  62 84 6b ff  d8 b0 ce 2e  18 6e 52 a8
|   c6 fb fe 30  fc ba a9 27  39 e3 94 ef  44 ac a3 7c
|   b1 b7 9e d6  11 ef b0 fe  03 4f 60 fa  a9 3b 04 f4
|   11 5a 43 40  27 31 63 e4  f2 bb 8d ee  87 c3 3b 70
|   08 a0 cc 75  d0 53 55 b5  64 f5 50 9e  b2 56 64 06
|   9b c0 33 47  54 de fc 72  c2 53 01 d5  9d 59 d8 6d
|   f8 15 09 78  06 e3 b7 ab  7e a1 0f 01  21 d0 51 4e
| complete v2 state transition with STF_OK
../parentI2x509 transition from state STATE_PARENT_I1 to state STATE_PARENT_I2
../parentI2x509 STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=aes_128 integ=sha1 prf=oakley_sha group=modp1536}
| sending reply packet to 192.1.2.23:500 (from port 500)
sending 1852 bytes for STATE_PARENT_I1 through eth0:500 to 192.1.2.23:500 (using #2)
|   00 01 02 03  04 05 06 07  c0 2e 7a 30  31 a0 31 88
|   2e 20 23 08  00 00 00 01  00 00 07 3c  23 80 07 20
|   00 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   52 89 67 16  e9 8d 47 58  74 5c 54 fb  14 2f 59 6a
|   75 23 a4 3c  57 a6 a4 3e  ea a0 d1 e5  8a 30 00 e6
|   82 98 2f 39  cf 00 bc 04  36 49 f5 63  e7 88 c7 69
|   74 32 b9 33  84 db 13 10  f4 e9 8a fe  a4 35 4d a2
|   41 8b ce e1  6a 9b 9b a3  fa fd 7c 7d  12 98 50 88
|   b5 61 50 66  ef 62 4c 41  68 a8 d4 7c  9e fe b5 86
|   cf ad fb d2  8c 9b 05 11  16 f0 ba dc  1a c3 42 ee
|   8c 78 96 97  d3 19 e8 d4  94 8a 4c 7f  6e c6 bf ff
|   9c 8b 36 27  c1 cf 76 4b  72 30 30 36  f2 ca 62 35
|   bd 36 b3 ef  ca c7 b5 ea  f0 72 2a f6  87 2b 54 00
|   c4 bb 77 89  86 de 0e e6  4f f1 4a 0e  34 d7 58 dd
|   bf bc 06 79  1d fa d9 c9  4b ae 15 b1  bc 26 12 90
|   cf 07 5f d5  03 cd 4a 10  04 05 1e 9e  84 ff 0c 05
|   dc 82 6e cb  69 cb 84 5b  1e 6f 95 49  7b 52 b3 b0
|   2a 00 dc 64  5c d1 ec 3a  07 ea d4 8d  7e 9b de e7
|   6c c3 2d 05  9e 27 de f9  3b c3 9a 5c  8f 2e 83 fc
|   23 ce 36 2c  96 56 98 e5  2d 28 f8 ec  ae c0 6e 19
|   2c 02 7d 26  b3 2c 6b 5f  8c ef 4b 26  09 0c 95 28
|   76 76 f9 1d  8b b7 98 e8  84 6c 6c fe  ce cc 1d c0
|   f8 9c 02 74  a0 99 52 3b  96 2b ff 91  63 26 a4 e0
|   a5 7e a7 db  d2 c2 9a 24  4b d1 e9 cc  23 4e d6 75
|   55 0c 0d 3a  1d cd 2c 23  56 82 05 c3  3e 87 45 d4
|   95 b4 e2 07  0c 87 e8 0d  be 47 b8 99  a3 99 fc f3
|   a9 c2 c5 6e  cc 32 d5 a9  5a ff 25 e8  9d 9f de b4
|   70 20 e9 b6  60 7b 22 a9  13 18 f8 fd  82 ba 4b c6
|   c6 55 20 6b  ac e1 6c f1  09 06 d4 bd  d5 96 51 ee
|   6d b4 1f 39  08 4b dc 41  bc 15 d9 7e  a5 c5 be 26
|   69 81 bf ee  9e ee b2 b3  9a 20 fa 65  d6 e4 b6 4d
|   45 95 44 e8  48 6f fc 06  5c 64 f5 2c  f1 3f 1b a4
|   d0 b7 4b 4d  d1 6d c8 07  0e dc d7 2c  18 59 dd ab
|   31 a2 6a c8  8f bf 81 32  9f 26 e5 7c  a6 c9 d9 d9
|   51 23 95 a5  fb bb 01 de  4a e3 92 b4  b7 47 7b 30
|   aa c6 18 c1  a6 01 df 0f  4a 48 34 3f  f8 22 d6 b8
|   05 d4 f1 42  b7 98 84 a1  36 5b d5 92  ae 93 0a f1
|   3d 58 86 9a  55 aa 28 80  35 87 8d 5d  51 8a bd 0c
|   ec 1d 5c f5  48 eb 99 33  28 66 70 9d  77 2d 9d cf
|   4d 88 02 4d  e4 f2 2f 2c  4c 18 fb 7c  58 60 1f a9
|   41 06 b2 43  8c 28 cb 62  98 bb 72 7c  64 be 17 96
|   16 67 2e 96  0b d4 b3 9c  79 64 2e 3e  17 03 73 ab
|   cc 2c 82 b5  e0 66 a2 3c  a3 6b 1d c8  98 fe 40 7a
|   dd 73 50 9a  30 ad db 60  61 ba de 8d  2f 83 d0 ad
|   9e e6 87 a2  1f 9c 87 08  c2 ec e6 57  b7 c5 ca 4d
|   57 a7 65 d2  a2 d7 89 08  05 ff 52 39  c9 5f 65 9b
|   83 21 7b 3c  3b cb 89 cf  62 95 ca d3  a4 0c d3 a6
|   8e f7 77 ee  7e 50 db be  13 04 cf 25  c8 7b 4b 7d
|   23 7f 2c 76  4c 08 0e 50  ff 9c f1 27  0a 57 7b b0
|   7b b2 19 2c  c2 e0 17 35  9e f1 55 72  26 3c 40 f1
|   9b 87 03 c2  44 2e d2 e4  fd 91 f8 f3  e9 c0 78 1b
|   cb 66 b5 3f  4c 59 14 d2  ca c9 7e be  6d bb 64 a2
|   46 7a af a6  e6 e1 28 3f  f9 f7 80 4e  80 94 95 07
|   b4 c8 1a e0  ef 5b af fe  03 5f 4a bc  85 66 8c da
|   bd ee a5 20  b3 b9 d5 d7  c8 00 1e 30  77 77 49 13
|   a7 aa f6 6d  8a b9 7d 49  9b 74 1e 65  37 bf 98 7d
|   71 8d 7e 48  ea 5e 23 d0  8a 44 d3 6a  d1 32 48 40
|   84 5b 81 a7  1c 7b 5b d8  36 98 10 95  3a 51 10 f9
|   b8 88 ba 40  9d 66 ea 81  ec d5 6e 56  66 de bd 14
|   db 81 d4 43  0f d5 cc b6  1f cf 48 51  a1 c8 1b f3
|   aa 50 be 91  cc 72 57 4a  70 a4 21 d5  22 79 04 a8
|   fe 9a 52 b3  1d df 11 dd  9a a3 39 96  67 22 8c 4a
|   f0 0d b3 4a  8e be 48 b1  12 67 72 7d  c8 9d 75 da
|   ee eb ef 9b  97 36 0f 9c  d0 e5 1a 15  a0 54 fb 96
|   6f 52 8a 5a  21 d7 c2 10  dd fb 8a 31  73 40 3e 00
|   6f 44 10 7f  8c 29 ef 46  03 1f bb 5e  90 a6 e2 93
|   c4 3e 62 22  b7 7c b1 81  f1 f2 83 17  0e a0 14 c3
|   69 7e e6 7c  95 fe 5d 4e  1e 80 0f 3c  9c d0 51 2f
|   74 d5 74 b5  5e fc 83 fc  29 ed f8 c3  06 fc da a8
|   a6 86 1d 03  b7 1b 90 41  9d 75 8a 52  07 82 dd 63
|   60 42 4a 58  fd d4 14 6a  51 9a 4d c6  e2 02 9f aa
|   03 37 60 98  ad 21 bd 3e  8a b4 28 84  b7 dd 88 f9
|   1a 55 60 8a  41 f8 fd bb  c2 c5 97 97  27 81 a8 73
|   3c e6 25 0f  78 db 51 ec  5f 09 21 62  2f 79 b9 6a
|   d9 15 72 e8  89 ac dc 7e  df 7c 21 06  d9 5e 64 df
|   14 dc 21 15  99 da c3 b0  b2 6b 04 38  ad 31 da cc
|   59 bc ff 43  22 b5 32 c0  20 6b 2a b6  2a 3e 4f d0
|   e8 6a 0d 6f  10 54 32 c6  2b 7a b9 11  8e d7 b9 13
|   5d 28 fb 0f  c5 3e 78 a8  4d 18 95 2b  85 c0 74 5a
|   3d 3b d8 b7  6e fe 16 9a  d4 63 d1 32  33 cd 22 dd
|   ab b1 4f 8c  9b 3b 4d 6a  d1 ea 0f c3  ee 01 31 51
|   6d 2f 14 f0  e6 13 4b 1d  cb e1 81 d0  15 e7 b9 b3
|   70 a5 f4 32  22 24 ff b4  ad 72 c5 c6  5b 50 04 63
|   bb e9 29 44  7b 77 fe 1b  14 1a d5 b1  b8 96 85 78
|   3d 74 a5 bc  09 8a f7 51  08 23 73 9d  a4 ff 57 dd
|   e5 7a e0 33  5c c7 3a ef  3f 66 65 36  9b de 6a db
|   7f 2c 03 28  86 67 5b 89  5a ba 58 bb  2a 83 f8 4f
|   f6 90 d3 37  20 b7 3d 40  20 d1 f7 4a  b0 1e d3 36
|   ae fa 53 e0  43 4a 43 ac  48 0f 99 82  4f 21 89 4f
|   d7 8b 3b fd  a8 8b db 96  f5 3e d6 f2  56 ce da be
|   eb a0 3c b6  05 69 a8 bf  a2 a5 d0 2b  1f ad d8 a0
|   3c d8 40 f4  d8 4d 6b c7  ec 30 33 24  67 63 64 92
|   4a fb 51 0c  1e bf d3 0e  82 e1 df 38  b2 41 31 47
|   d4 8d 79 c4  68 ae 77 f5  26 19 54 dc  31 8c 27 cb
|   b6 33 8c 58  63 f3 1a 5a  0f 52 0d 02  43 12 b1 6a
|   eb 1a b6 ad  4e d2 d2 2d  76 29 9b 45  8d f6 21 e6
|   43 62 f3 5c  a0 9a 41 b5  44 b8 e1 9f  82 49 8a 1a
|   a2 f3 8d 55  b8 35 44 93  8e 57 49 62  db 7a 7d f6
|   30 83 48 f1  3c ec ce e0  e1 75 c0 c7  24 ec 03 07
|   65 cb f3 ad  24 2e 51 b6  60 98 00 43  ea 6e 16 28
|   a2 19 44 b2  2a 24 59 f0  21 a8 a5 f9  56 49 9b 5e
|   68 83 65 28  1b 7f 80 79  07 c5 a4 b5  b3 98 fd 7f
|   1a e2 3f 81  c3 34 a0 94  7d 94 eb 39  ce 6f d4 85
|   61 6a be 19  b7 6e 11 36  2e 2c b1 8f  ff 5b 2d 84
|   1f ff 10 ec  2e b6 96 f0  ec 67 13 71  1f c2 8e 47
|   90 8b a8 3a  20 23 1d 7f  f8 e8 ca 8f  54 35 93 15
|   93 d2 d6 a2  0f 85 78 9c  e5 16 5e 29  92 4a 66 41
|   95 ed 5f 5f  21 ac a6 59  d4 f1 f2 d2  40 6e 25 8a
|   34 40 b0 b1  62 84 6b ff  d8 b0 ce 2e  18 6e 52 a8
|   c6 fb fe 30  fc ba a9 27  39 e3 94 ef  44 ac a3 7c
|   b1 b7 9e d6  11 ef b0 fe  03 4f 60 fa  a9 3b 04 f4
|   11 5a 43 40  27 31 63 e4  f2 bb 8d ee  87 c3 3b 70
|   08 a0 cc 75  d0 53 55 b5  64 f5 50 9e  b2 56 64 06
|   9b c0 33 47  54 de fc 72  c2 53 01 d5  9d 59 d8 6d
|   f8 15 09 78  06 e3 b7 ab  7e a1 0f 01  21 d0 51 4e
|   65 c6 5d c2  3f 61 93 2e  76 47 2b 7e
| deleting state #2
| ICOOKIE:  00 01 02 03  04 05 06 07
| RCOOKIE:  c0 2e 7a 30  31 a0 31 88
| state hash entry 30
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_prop
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: 4 * sa copy attrs array
../parentI2x509 leak: sa copy trans array
../parentI2x509 leak: sa copy prop array
../parentI2x509 leak: sa copy prop conj array
../parentI2x509 leak: sa copy prop_conj
../parentI2x509 leak: ikev2_inR1outI2 KE
../parentI2x509 leak: long term secret
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_prop
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: msg_digest
../parentI2x509 leak: ikev2_outI1 KE
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_prop
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: db_v2_trans
../parentI2x509 leak: db_v2_prop_conj
../parentI2x509 leak: host_pair
../parentI2x509 leak: host ip
../parentI2x509 leak: keep id name
../parentI2x509 leak: host ip
../parentI2x509 leak: ca string
../parentI2x509 leak: keep id name
../parentI2x509 leak: connection name
../parentI2x509 leak: issuer dn
../parentI2x509 leak: keep id name
../parentI2x509 leak: pubkey entry
../parentI2x509 leak: pubkey
../parentI2x509 leak: 2 * generalName
../parentI2x509 leak: x509cert
../parentI2x509 leak: host cert
../parentI2x509 leak: certificate filename
../parentI2x509 leak: struct connection
../parentI2x509 leak: id_list
../parentI2x509 leak: keep id name
../parentI2x509 leak: id_list
../parentI2x509 leak: secret
../parentI2x509 leak: 2 * id list
../parentI2x509 leak: secret
../parentI2x509 leak: x509cert
../parentI2x509 leak: CA cert
../parentI2x509 leak: x509cert
../parentI2x509 leak: CA cert
../parentI2x509 leak: 2 * hasher name
../parentI2x509 leak: override /
../parentI2x509 leak: 7 * default conf
../parentI2x509 leak: policies path
../parentI2x509 leak: ocspcerts path
../parentI2x509 leak: aacerts path
../parentI2x509 leak: certs path
../parentI2x509 leak: private path
../parentI2x509 leak: crls path
../parentI2x509 leak: cacert path
../parentI2x509 leak: acert path
../parentI2x509 leak: override ipsec.d
../parentI2x509 leak: 7 * default conf
TCPDUMP output
reading from file parentI2x509.pcap, link-type NULL (BSD loopback)
IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 536, bad cksum 0 (->f48e)!)
    192.1.2.45.500 > 192.1.2.23.500: [no cksum] isakmp 2.0 msgid 00000000 cookie 0001020304050607->0000000000000000: parent_sa ikev2_init[I]:
    (sa[C]: len=240
        (p: #1 protoid=isakmp transform=4 len=40
            (t: #1 type=encr id=aes )
            (t: #2 type=integ id=hmac-sha )
            (t: #3 type=prf id=hmac-sha )
            (t: #4 type=dh id=modp1536 ))
        (p: #2 protoid=isakmp transform=4 len=40
            (t: #1 type=encr id=aes )
            (t: #2 type=integ id=hmac-sha )
            (t: #3 type=prf id=hmac-md5 )
            (t: #4 type=dh id=modp1536 ))
        (p: #3 protoid=isakmp transform=4 len=40
            (t: #1 type=encr id=3des )
            (t: #2 type=integ id=hmac-sha )
            (t: #3 type=prf id=hmac-sha )
            (t: #4 type=dh id=modp1536 ))
        (p: #4 protoid=isakmp transform=4 len=40
            (t: #1 type=encr id=3des )
            (t: #2 type=integ id=hmac-sha )
            (t: #3 type=prf id=hmac-md5 )
            (t: #4 type=dh id=modp1536 ))
        (p: #5 protoid=isakmp transform=4 len=40
            (t: #1 type=encr id=3des )
            (t: #2 type=integ id=hmac-sha )
            (t: #3 type=prf id=hmac-sha )
            (t: #4 type=dh id=modp1024 ))
        (p: #6 protoid=isakmp transform=4 len=40
            (t: #1 type=encr id=3des )
            (t: #2 type=integ id=hmac-sha )
            (t: #3 type=prf id=hmac-md5 )
            (t: #4 type=dh id=modp1024 )))
    (v2ke: len=192 group=modp1536)
    (nonce[C]: len=16 nonce=(b5ce8419095c6e2b6b62d3055305b3c4) )
    (v2vid: len=12 vid=OEababababab)
IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 1880, bad cksum 0 (->ef4e)!)
    192.1.2.45.500 > 192.1.2.23.500: [no cksum] isakmp 2.0 msgid 00000001 cookie 0001020304050607->c02e7a3031a03188: child_sa  ikev2_auth[I]:
    (v2e[C]: len=1820
            (v2IDi: len=159 dn:308198310b30090603550406130263613110300e060355040813074f6e746172696f31123010060355040a130958656c6572616e636531183016060355040b130f54657374204465706172746d656e74312330210603550403131a776573742e74657374696e672e78656c6572616e63652e636f6d3124302206092a864886f70d010901161574657374696e674078656c6572616e63652e636f6d)
            (v2cert: len=1217)
            (v2auth: len=196 method=rsasig authdata=(000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000) )
            (sa[C]: len=144
                (p: #1 protoid=ipsec-esp transform=3 len=36 spi=12345678
                    (t: #1 type=encr id=aes )
                    (t: #2 type=integ id=hmac-sha )
                    (t: #3 type=esn id=no-esn ))
                (p: #2 protoid=ipsec-esp transform=3 len=36 spi=12345678
                    (t: #1 type=encr id=aes )
                    (t: #2 type=integ id=hmac-sha )
                    (t: #3 type=esn id=no-esn ))
                (p: #3 protoid=ipsec-esp transform=3 len=36 spi=12345678
                    (t: #1 type=encr id=3des )
                    (t: #2 type=integ id=hmac-sha )
                    (t: #3 type=esn id=no-esn ))
                (p: #4 protoid=ipsec-esp transform=3 len=36 spi=12345678
                    (t: #1 type=encr id=3des )
                    (t: #2 type=integ id=hmac-sha )
                    (t: #3 type=esn id=no-esn )))
            (v2TSi: len=20)
            (v2TSr: len=20))
