./rsa-v2 adjusting ipsec.d to ../../baseconfigs/east/etc/ipsec.d
./rsa-v2 ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
./rsa-v2 ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
./rsa-v2 ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
./rsa-v2 ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
./rsa-v2 ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
./rsa-v2 ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
./rsa-v2 ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
Pre-amble: #!-pluto-whack-file- recorded on west on 2007-10-07 01:40:12
./rsa-v2 listening for IKE messages
./rsa-v2 loading secrets from "../../baseconfigs/east/etc/ipsec.secrets"
./rsa-v2 loaded private key for keyid: PPK_RSA:AQN3cn11F
./rsa-v2   loaded private key file '../../baseconfigs/east/etc/ipsec.d/private/east.pem' (963 bytes)
|   decrypting file using 'DES-EDE3-CBC'
./rsa-v2 loaded private key for keyid: PPK_RSA:AwEAAaFHY
| interface "eth0" matched right side
./rsa-v2 added connection description "westnet--eastnet-ikev2"
| base debugging = crypt+parsing+control+controlmore
./rsa-v2 listening for IKE messages
./rsa-v2 forgetting secrets
./rsa-v2 loading secrets from "../../baseconfigs/east/etc/ipsec.secrets"
./rsa-v2 loaded private key for keyid: PPK_RSA:AQN3cn11F
| id type added to secret(0xADDRESS) 1: C=CA, ST=Ontario, O=Openswan, CN=east.uml.freeswan.org, E=east@openswan.org
| id type added to secret(0xADDRESS) 1: %any
./rsa-v2   loaded private key file '../../baseconfigs/east/etc/ipsec.d/private/east.pem' (963 bytes)
|   file content is not binary ASN.1
|   -----BEGIN RSA PRIVATE KEY-----
|   Proc-Type: 4,ENCRYPTED
|   DEK-Info: DES-EDE3-CBC,16F2C4D726B9DB34
|   -----END RSA PRIVATE KEY-----
|   decrypting file using 'DES-EDE3-CBC'
|   file coded in PEM format
| L0 - RSAPrivateKey:
| L1 - version:
| L1 - modulus:
| L1 - publicExponent:
| L1 - privateExponent:
| L1 - prime1:
| L1 - prime2:
| L1 - exponent1:
| L1 - exponent2:
| L1 - coefficient:
./rsa-v2 loaded private key for keyid: PPK_RSA:AwEAAaFHY
RC=0 "westnet--eastnet-ikev2": 192.0.2.0/24===192.1.2.23<192.1.2.23>[@east]...192.1.2.45<192.1.2.45>[@west]===192.0.1.0/24; unrouted; eroute owner: #0
RC=0 "westnet--eastnet-ikev2":     myip=unset; hisip=unset;
RC=0 "westnet--eastnet-ikev2":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3
RC=0 "westnet--eastnet-ikev2":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init; prio: 24,24; interface: eth0; 
RC=0 "westnet--eastnet-ikev2":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
./rsa-v2 forgetting secrets
./rsa-v2 loading secrets from "../../baseconfigs/east/etc/ipsec.secrets"
./rsa-v2 loaded private key for keyid: PPK_RSA:AQN3cn11F
| id type added to secret(0xADDRESS) 1: C=CA, ST=Ontario, O=Openswan, CN=east.uml.freeswan.org, E=east@openswan.org
| id type added to secret(0xADDRESS) 1: %any
./rsa-v2   loaded private key file '../../baseconfigs/east/etc/ipsec.d/private/east.pem' (963 bytes)
|   file content is not binary ASN.1
|   -----BEGIN RSA PRIVATE KEY-----
|   Proc-Type: 4,ENCRYPTED
|   DEK-Info: DES-EDE3-CBC,16F2C4D726B9DB34
|   -----END RSA PRIVATE KEY-----
|   decrypting file using 'DES-EDE3-CBC'
|   file coded in PEM format
| L0 - RSAPrivateKey:
| L1 - version:
| L1 - modulus:
| L1 - publicExponent:
| L1 - privateExponent:
| L1 - prime1:
| L1 - prime2:
| L1 - exponent1:
| L1 - exponent2:
| L1 - coefficient:
./rsa-v2 loaded private key for keyid: PPK_RSA:AwEAAaFHY
| started looking for secret for @east->@west of kind PPK_RSA
| actually looking for secret for @east->@west of kind PPK_RSA
| line 25: key type PPK_RSA(@east) to type PPK_RSA 
| 1: compared key %any to @east / @west -> 0
| 2: compared key C=CA, ST=Ontario, O=Openswan, CN=east.uml.freeswan.org, E=east@openswan.org to @east / @west -> 0
| line 25: match=0 
| line 8: key type PPK_RSA(@east) to type PPK_RSA 
| 1: compared key (none) to @east / @west -> 6
| 2: compared key (none) to @east / @west -> 6
| line 8: match=6 
| best_match 0>6 best=0xADDRESS (line=8)
| concluding with best_match=6 best=0xADDRESS (lineno=8)
| inputs to hash1 (first packet)
|   00 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 01 fc  22 80 00 f4
|   02 00 00 28  01 01 00 04  03 00 00 08  01 00 00 0c
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  02 01 00 04
|   03 00 00 08  01 00 00 0c  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  03 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  04 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  05 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 02  00 00 00 28  06 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 02
|   28 00 00 c8  00 05 00 00  ff bc 6a 92  a6 b9 55 9b
|   05 fa 96 a7  a4 35 07 b4  c1 e1 c0 86  1a 58 71 d9
|   ba 73 a1 63  11 37 88 c0  de bb 39 79  e7 ff 0c 52
|   b4 ce 60 50  eb 05 36 9e  a4 30 0d 2b  ff 3b 1b 29
|   9f 3b 80 2c  cb 13 31 8c  2a b9 e3 b5  62 7c b4 b3
|   5e b9 39 98  20 76 b5 7c  05 0d 7b 35  c3 c5 c7 cc
|   8c 0f ea b7  b6 4a 7d 7b  6b 8f 6b 4d  ab f4 ac 40
|   6d d2 01 26  b9 0a 98 ac  76 6e fa 37  a7 89 0c 43
|   94 ff 9a 77  61 5b 58 f5  2d 65 1b bf  a5 8d 2a 54
|   9a f8 b0 1a  a4 bc a3 d7  62 42 66 63  b1 55 d4 eb
|   da 9f 60 a6  a1 35 73 e6  a8 88 13 5c  dc 67 3d d4
|   83 02 99 03  f3 a9 0e ca  23 e1 ec 1e  27 03 31 b2
|   d0 50 f4 f7  58 f4 99 27  2b 80 00 14  b5 ce 84 19
|   09 5c 6e 2b  6b 62 d3 05  53 05 b3 c4  00 00 00 10
|   4f 45 73 40  40 7a 4a 56  57 5b 6a 5d
| inputs to hash2 (responder nonce)
|   b5 ce 84 19  09 5c 6e 2b  6b 62 d3 05  53 05 b3 c4
| idhash  01 02 03 04  11 12 13 14  21 22 23 24  31 32 33 34
|   41 42 43 44
| v2rsa octets  30 21 30 09  06 05 2b 0e  03 02 1a 05  00 04 14 47
|   8f 2d 01 ca  ce e5 9c 83  c5 f2 3c 18  dc 44 7a 2c
|   d5 2b 3e
| signing hash with RSA Key *AQN3cn11F
| rsa signature  2c 62 5c 5c  30 bb ac ae  0a bb 9d 50  86 63 ec bc
|   57 28 50 ba  b8 73 d6 40  3c 31 a4 2b  72 18 c1 de
|   da ec 10 d5  47 a5 42 33  23 32 e5 4e  cf c6 47 6a
|   27 a5 66 b7  6b f9 6f 32  55 b7 c1 3d  cf 13 31 c9
|   4a 16 ee 83  d4 dd fc 33  9a 4d 8b 7d  c5 8d ab 27
|   38 89 dc db  eb df d9 8a  be 32 a4 0c  11 9d 0d f6
|   93 ec 33 6d  1a 58 65 32  f3 ed 03 c1  8a 26 bd 0b
|   9e 46 52 d2  e5 83 c8 5a  43 b5 94 70  56 e5 03 92
|   e7 d9 fd 4e  19 b5 83 13  db af 9c 02  63 43 0e c2
|   1f dc c3 cf  20 3c cc c6  03 2d 92 8d  5a ca 27 9e
|   d9 f9 d7 1e  fe 69 de 87  87 ea 95 e2  e7 08 1a f1
|   9c 4a 0b 37  de 03 39 05  8d 89 52 f5  d2 63 e7 f5
|   8f ed 7d 99  80 f2 91 81  2d ef ea 53  83 0d f6 e0
|   ae db 65 ba  35 5e 10 1a  d0 01 b5 a4  cc 26 43 db
|   d0 fe fb ba  19 10 74 af  ef 16 3e ca  1b 09 a7 93
|   fc db 22 41  6a c4 92 73  69 37 b4 15  25 0b a0 df
RC=0 "westnet--eastnet-ikev2": 192.0.1.0/24===192.1.2.45<192.1.2.45>[@west]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24; unrouted; eroute owner: #0
RC=0 "westnet--eastnet-ikev2":     myip=unset; hisip=unset;
RC=0 "westnet--eastnet-ikev2":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3
RC=0 "westnet--eastnet-ikev2":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init; prio: 24,24; interface: eth0; 
RC=0 "westnet--eastnet-ikev2":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
| inputs to hash1 (first packet)
|   00 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 01 fc  22 80 00 f4
|   02 00 00 28  01 01 00 04  03 00 00 08  01 00 00 0c
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  02 01 00 04
|   03 00 00 08  01 00 00 0c  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  03 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  04 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  05 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 02  00 00 00 28  06 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 02
|   28 00 00 c8  00 05 00 00  ff bc 6a 92  a6 b9 55 9b
|   05 fa 96 a7  a4 35 07 b4  c1 e1 c0 86  1a 58 71 d9
|   ba 73 a1 63  11 37 88 c0  de bb 39 79  e7 ff 0c 52
|   b4 ce 60 50  eb 05 36 9e  a4 30 0d 2b  ff 3b 1b 29
|   9f 3b 80 2c  cb 13 31 8c  2a b9 e3 b5  62 7c b4 b3
|   5e b9 39 98  20 76 b5 7c  05 0d 7b 35  c3 c5 c7 cc
|   8c 0f ea b7  b6 4a 7d 7b  6b 8f 6b 4d  ab f4 ac 40
|   6d d2 01 26  b9 0a 98 ac  76 6e fa 37  a7 89 0c 43
|   94 ff 9a 77  61 5b 58 f5  2d 65 1b bf  a5 8d 2a 54
|   9a f8 b0 1a  a4 bc a3 d7  62 42 66 63  b1 55 d4 eb
|   da 9f 60 a6  a1 35 73 e6  a8 88 13 5c  dc 67 3d d4
|   83 02 99 03  f3 a9 0e ca  23 e1 ec 1e  27 03 31 b2
|   d0 50 f4 f7  58 f4 99 27  2b 80 00 14  b5 ce 84 19
|   09 5c 6e 2b  6b 62 d3 05  53 05 b3 c4  00 00 00 10
|   4f 45 73 40  40 7a 4a 56  57 5b 6a 5d
| inputs to hash2 (responder nonce)
|   b5 ce 84 19  09 5c 6e 2b  6b 62 d3 05  53 05 b3 c4
| idhash  01 02 03 04  11 12 13 14  21 22 23 24  31 32 33 34
|   41 42 43 44
| required CA is '%any'
|   trusted_ca called with a=(empty) b=(empty)
| key issuer CA is '%any'
| v2rsa decrypted SIG:
|   47 8f 2d 01  ca ce e5 9c  83 c5 f2 3c  18 dc 44 7a
|   2c d5 2b 3e
| v2rsa computed hash:
|   47 8f 2d 01  ca ce e5 9c  83 c5 f2 3c  18 dc 44 7a
|   2c d5 2b 3e
| an RSA Sig check passed with *AQN3cn11F [preloaded key]
stf status: STF_OK
