./certificateselfI2 ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
./certificateselfI2 ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
./certificateselfI2 ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
./certificateselfI2 adjusting ipsec.d to ../samples/rwcert
./certificateselfI2 loading secrets from "../samples/rwcert.secrets"
./certificateselfI2   loaded private key file '../samples/rwcert/private/carolKey.pem' (1679 bytes)
./certificateselfI2 loaded private key for keyid: PPK_RSA:AwEAAbfz1
| processing whack message of size: A
| processing whack message of size: A
processing whack msg time: X size: Y
| find_host_pair: looking for me=<none>:500 %any him=<none>:500 any-match
| find_host_pair: concluded with <none>
| found_host_pair_conn (check_connection_end): %any:500 %any/%any:500 -> hp:none
| Added new connection home with policy RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
./certificateselfI2   loading certificate from carolCert.pem
./certificateselfI2   loaded host cert file '../samples/rwcert/certs/carolCert.pem' (1493 bytes)
| certificate is valid
| counting wild cards for carol@strongswan.org is 0
| counting wild cards for @moon.strongswan.org is 0
| orient home checking against if: eth0 (AF_INET:93.184.216.34:500)
| orient home matching on public/private keys: this=no[%address] that=yes[%defaultroute]
|   orient home matched on that having private key
|   picking maching interface for family[2,2]: AF_INET resulted in: 93.184.216.34
|   orient home finished with: 1 [93.184.216.34]
| find_host_pair: looking for me=<invalid>:500 %address him=132.213.238.7:500 exact-match
| find_host_pair: concluded with <none>
| connect_to_host_pair: <invalid>:500 %address 132.213.238.7:500 -> hp:none
| find_ID_host_pair: looking for me=carol@strongswan.org him=@moon.strongswan.org (exact)
|   concluded with <none>
./certificateselfI2 adding connection: "home"
| %any[carol@strongswan.org]...132.213.238.7[@moon.strongswan.org]===10.2.0.0/16
| ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1; policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|   orient home finished with: 1 [93.184.216.34]
RC=0 "home": %any[carol@strongswan.org]...132.213.238.7[@moon.strongswan.org]===10.2.0.0/16; unrouted; eroute owner: #0
RC=0 "home":     myip=unset; hisip=unset; mycert=carolCert.pem;
RC=0 "home":   CAs: 'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'...'%any'
RC=0 "home":   ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1
RC=0 "home":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK+lKOD+rKOD; prio: 16,0; interface: eth0; kind=CK_PERMANENT
| creating state object #1 at Z
| orient home checking against if: eth0 (AF_INET:93.184.216.34:500)
| orient home matching on public/private keys: this=yes[%defaultroute] that=no[%address]
|   orient home matched on this having private key
|   picking maching interface for family[2,2]: AF_INET resulted in: 93.184.216.34
|   orient home finished with: 1 [93.184.216.34]
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| inserting state object #1 bucket: 4
./certificateselfI2 initiating v2 parent SA
./certificateselfI2 STATE_PARENT_I1: initiate
sending 836 bytes for ikev2_parent_outI1_common through eth0:500 to 132.213.238.7:500 (using #1)
|   80 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 03 44  22 00 01 fc
|   02 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  02 00 00 2c
|   02 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 28  03 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 02  00 00 00 08  04 00 00 0e
|   02 00 00 28  04 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 2c  05 01 00 04
|   03 00 00 0c  01 00 00 0c  80 0e 00 80  03 00 00 08
|   03 00 00 02  03 00 00 08  02 00 00 02  00 00 00 08
|   04 00 00 05  02 00 00 2c  06 01 00 04  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  07 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  08 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  09 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 02  02 00 00 28  0a 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 02
|   02 00 00 2c  0b 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 02  00 00 00 2c
|   0c 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 02  28 00 01 08  00 0e 00 00
|   3d a6 6a 81  e2 92 09 be  18 4f a0 1e  5c ed ea 7c
|   7d 7b 3a 21  3e 15 0d 53  5d 17 6a be  1b c5 70 ab
|   34 47 bc 09  14 7c aa 91  9c 8f 81 dc  1e f9 87 cd
|   6a ec fa f3  a5 9e 37 bc  ac 3d fd e1  32 8e e8 b3
|   fe d3 8b f4  7b 50 34 13  33 7a 93 ea  e9 3c 0e 8b
|   bd 48 18 9c  9e 03 70 f2  55 ce 45 22  9f c7 c9 48
|   43 a3 e2 64  b5 5d 43 38  c8 fe f1 d3  06 43 f0 0a
|   e8 6d 61 8c  60 78 d9 98  d3 1b 3b 5e  f5 a6 e8 2f
|   ef 56 ac b4  33 bd 1e 62  b2 3e 0b 17  af 6c b8 31
|   08 d7 19 5a  7b c4 54 c2  13 47 98 c2  cc d2 16 29
|   75 6c 03 fb  1e 9c 9d 21  0c a1 e6 c2  f3 f2 49 2c
|   f6 06 73 c1  96 1e ce 58  81 01 1c cb  16 dc f9 fc
|   c7 93 08 75  58 16 57 71  69 96 66 b7  a9 81 7f f7
|   37 4d 7c 41  38 62 a6 39  00 81 ca 3d  1d fc f7 b5
|   08 38 d4 34  70 22 6c 21  d2 5b 20 a1  d2 ba 2a d1
|   89 f3 20 79  ce ac 1e c2  ec 7d ae 76  94 40 39 a0
|   2b 00 00 14  20 98 9d 37  a8 14 a6 4d  8f f0 7c 08
|   d3 20 e9 e3  00 00 00 10  4f 45 70 6c  75 74 6f 75
|   6e 69 74 30
./certificateselfI2 transition from state STATE_IKEv2_START to state STATE_PARENT_I1
./certificateselfI2 STATE_PARENT_I1: sent v2I1, expected v2R1 (msgid: 00000000)
| *received 376 bytes from 132.213.238.7:500 on eth0 (port=500)
|   80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   21 20 22 20  00 00 00 00  00 00 01 78  22 00 00 30
|   00 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  28 00 01 08
|   00 0e 00 00  a5 9a 13 6c  b8 87 48 57  e1 22 6e a0
|   b8 55 c2 00  31 15 65 84  8b f9 dc a4  5f 49 d4 c5
|   f0 98 8e 9b  31 85 6e 27  5a c2 75 09  07 37 05 b5
|   b1 53 18 07  81 e8 1d 07  c6 19 1c de  dc 1f 2c 26
|   d2 0b 59 f9  67 6a ee 3c  e5 fa 72 3f  54 96 1e 7d
|   8e d0 30 08  0b ed 95 b0  65 2f 5c a6  36 7e 92 2d
|   da cb 88 54  e3 97 fa 16  6f 9e 7c a6  0c 43 2f 29
|   be 2c a4 55  68 01 45 bc  56 a9 84 b9  2b 1b bf 9a
|   fc 84 67 5f  d3 04 79 90  b7 fa 89 5b  04 06 d5 9a
|   50 92 16 4b  d6 33 40 be  2a 44 94 74  33 a7 a5 c1
|   1f 88 5b eb  4e d2 bb 94  b9 22 db e3  b6 5a 8c f9
|   d6 43 5d 5e  5d c9 19 b8  c8 81 53 01  95 09 02 7b
|   c0 2a b0 c8  5d 2c 69 78  6c e8 f6 5d  e4 90 43 83
|   fd f7 98 5e  cc 92 5c 79  7b 62 ae 98  db 4f 7f e0
|   68 7c cd 29  69 0a ad a3  e8 37 d7 41  b4 79 b3 a5
|   38 a2 8d a0  69 ff bd aa  ba d5 54 70  40 ab b5 fc
|   26 6d ae ce  2b 00 00 14  c6 ba 31 9f  88 5b e7 b7
|   a2 93 85 dc  bb c6 15 84  00 00 00 10  4f 45 70 6c
|   75 74 6f 75  6e 69 74 30
| **parse ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   64 0a 06 43  5c 7c 4b 31
|    next payload type: ISAKMP_NEXT_v2SA
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_SA_INIT
|    flags: ISAKMP_FLAG_RESPONSE
|    message ID:  00 00 00 00
|    length: 376
|  processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34), msgid: 00000000
| I am IKE SA Initiator
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
| v2 state object not found
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| v2 peer and cookies match on #1
| v2 state object #1 (home) found, in STATE_PARENT_I1
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
| inserting state object #1 bucket: 5
| state found and its state is:STATE_PARENT_I1 msgid: 00000
| ***parse IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2KE
|    critical bit: none
|    length: 48
| processing payload: ISAKMP_NEXT_v2SA (len=48)
| ***parse IKEv2 Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_v2Ni
|    critical bit: none
|    length: 264
|    transform type: 14
| processing payload: ISAKMP_NEXT_v2KE (len=264)
| ***parse IKEv2 Nonce Payload:
|    next payload type: ISAKMP_NEXT_v2V
|    critical bit: none
|    length: 20
| processing payload: ISAKMP_NEXT_v2Ni (len=20)
| ***parse IKEv2 Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    critical bit: none
|    length: 16
| processing payload: ISAKMP_NEXT_v2V (len=16)
| considering state entry: 0
| Now lets proceed with state specific processing
| ikev2 parent inR1: calculating g^{xy} in order to send I2
| ****parse IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    length: 44
|    prop #: 1
|    proto ID: 1
|    spi size: 0
|    # transforms: 4
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    length: 12
|    transform type: 1
|    transform ID: 12
| ******parse IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    length: 8
|    transform type: 3
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    length: 8
|    transform type: 2
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    length: 8
|    transform type: 4
|    transform ID: 14
| ikev2 parent SA details
| ikev2 I 0x8001020304050607 0x640a06435c7c4b31 sha1:0x4ea8e662b07cdd430f6944c6723e4b82d5722418 aes128:0x3f44bf47cafd8150591deb088199fcbf
| ikev2 R 0x8001020304050607 0x640a06435c7c4b31 sha1:0x515b0bd22e6d76b34fdb760aa7bfad80b109b75d aes128:0xbedb67ec7dc3d00cccac42e70cd63bde
| duplicating state object #1
| creating state object #2 at Z
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
| inserting state object #2 bucket: 5
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   64 0a 06 43  5c 7c 4b 31
|    next payload type: ISAKMP_NEXT_v2E
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_AUTH
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 01
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2IDi
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
| IKEv2 thinking whether to send my certificate:
|  my policy has  RSASIG, the policy is : RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|  sendcert: CERT_ALWAYSSEND and I did not get a certificate request
|  so send cert.
| *****emit IKEv2 Identification Payload:
|    next payload type: ISAKMP_NEXT_v2CERT
|    critical bit: none
|    id_type: ID_USER_FQDN
| emitting 20 raw bytes of my identity into IKEv2 Identification Payload
| my identity  63 61 72 6f  6c 40 73 74  72 6f 6e 67  73 77 61 6e
|   2e 6f 72 67
| emitting length of IKEv2 Identification Payload: 28
| idhash calc pi  cc 07 97 44  b4 a3 4e 8a  0d 2f 27 8b  ee 06 6d 07
|   a5 a5 75 2e
| idhash calc I2  03 00 00 00  63 61 72 6f  6c 40 73 74  72 6f 6e 67
|   73 77 61 6e  2e 6f 72 67
| Thinking about sending a certificate request (CERTREQ)
|   my policy is : RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|  my next payload will not be a certificate request
| I did not send a certificate request (CERTREQ) because
|   no known CA for the other end
| I am sending my certificate
| *****emit IKEv2 Certificate Payload:
|    next payload type: ISAKMP_NEXT_v2AUTH
|    critical bit: none
|    ikev2 cert encoding: CERT_X509_SIGNATURE
| emitting 1062 raw bytes of CERT into IKEv2 Certificate Payload
| CERT  30 82 04 22  30 82 03 0a  a0 03 02 01  02 02 01 30
|   30 0d 06 09  2a 86 48 86  f7 0d 01 01  0b 05 00 30
|   45 31 0b 30  09 06 03 55  04 06 13 02  43 48 31 19
|   30 17 06 03  55 04 0a 13  10 4c 69 6e  75 78 20 73
|   74 72 6f 6e  67 53 77 61  6e 31 1b 30  19 06 03 55
|   04 03 13 12  73 74 72 6f  6e 67 53 77  61 6e 20 52
|   6f 6f 74 20  43 41 30 1e  17 0d 31 34  30 38 32 37
|   31 35 30 35  33 36 5a 17  0d 31 39 30  38 32 36 31
|   35 30 35 33  36 5a 30 5a  31 0b 30 09  06 03 55 04
|   06 13 02 43  48 31 19 30  17 06 03 55  04 0a 13 10
|   4c 69 6e 75  78 20 73 74  72 6f 6e 67  53 77 61 6e
|   31 11 30 0f  06 03 55 04  0b 13 08 52  65 73 65 61
|   72 63 68 31  1d 30 1b 06  03 55 04 03  14 14 63 61
|   72 6f 6c 40  73 74 72 6f  6e 67 73 77  61 6e 2e 6f
|   72 67 30 82  01 22 30 0d  06 09 2a 86  48 86 f7 0d
|   01 01 01 05  00 03 82 01  0f 00 30 82  01 0a 02 82
|   01 01 00 b7  f3 d4 37 17  ca df ec 38  02 e2 d4 86
|   7f 45 cb 8f  6b 99 be e1  f8 92 49 3d  b0 55 65 ab
|   97 0d e1 52  37 a2 c0 b7  e0 a0 ba ed  29 a1 97 e2
|   2f 80 b7 cd  99 a2 5d a6  75 b1 17 16  93 be f6 ac
|   57 96 23 f6  bb 47 de c6  a3 f8 98 1b  99 ba cd c4
|   2c 0f 36 10  e2 f4 95 0d  9a 84 08 bc  3b 7a 9a 7e
|   40 cc 05 28  2f a1 e2 69  13 03 5e d3  45 20 87 9d
|   e0 ee 14 fb  77 0f 2d 4a  07 0f 1a a4  24 5a eb 48
|   20 a4 fd 4f  a7 bf 1d b1  cd 8d 1b 58  97 0f 59 94
|   7b 29 f2 04  98 8e 0f d0  ea f5 7a a1  fb 6d b9 e3
|   14 0f d3 51  bf cc 36 63  be ab 9d 14  66 50 67 f7
|   1a 53 45 16  68 31 66 7b  42 25 1b 98  96 d9 f1 57
|   b5 5c 08 5a  29 a7 26 ae  62 df df 3e  68 c0 c5 b3
|   d1 ba 11 ca  69 c9 f3 23  3a bc dc 8c  5f e5 f4 a3
|   31 39 65 b8  60 9f 58 55  ff 34 61 0d  5d a9 81 a8
|   28 64 44 b1  e6 b8 21 cd  7b 1c 51 a7  db 36 17 54
|   b5 d2 11 02  03 01 00 01  a3 82 01 06  30 82 01 02
|   30 09 06 03  55 1d 13 04  02 30 00 30  0b 06 03 55
|   1d 0f 04 04  03 02 03 a8  30 1d 06 03  55 1d 0e 04
|   16 04 14 5c  59 70 62 57  2d 2a 24 9c  5c 94 56 9b
|   89 5e e5 c5  05 b6 bd 30  6d 06 03 55  1d 23 04 66
|   30 64 80 14  5d a7 dd 70  06 51 32 7e  e7 b6 6d b3
|   b5 e5 e0 60  ea 2e 4d ef  a1 49 a4 47  30 45 31 0b
|   30 09 06 03  55 04 06 13  02 43 48 31  19 30 17 06
|   03 55 04 0a  13 10 4c 69  6e 75 78 20  73 74 72 6f
|   6e 67 53 77  61 6e 31 1b  30 19 06 03  55 04 03 13
|   12 73 74 72  6f 6e 67 53  77 61 6e 20  52 6f 6f 74
|   20 43 41 82  01 00 30 1f  06 03 55 1d  11 04 18 30
|   16 81 14 63  61 72 6f 6c  40 73 74 72  6f 6e 67 73
|   77 61 6e 2e  6f 72 67 30  39 06 03 55  1d 1f 04 32
|   30 30 30 2e  a0 2c a0 2a  86 28 68 74  74 70 3a 2f
|   2f 63 72 6c  2e 73 74 72  6f 6e 67 73  77 61 6e 2e
|   6f 72 67 2f  73 74 72 6f  6e 67 73 77  61 6e 2e 63
|   72 6c 30 0d  06 09 2a 86  48 86 f7 0d  01 01 0b 05
|   00 03 82 01  01 00 55 a9  3c 34 0d 10  01 13 07 30
|   90 cb 03 91  7d 72 21 7e  25 38 30 1a  76 f4 aa fc
|   f3 ff 33 77  ba 56 86 4e  5c 1a 61 29  0b ea 80 08
|   1a 0a 99 3e  bc 05 e8 1c  d3 c8 9a 0f  af 45 57 98
|   6c 87 92 d0  4d a5 32 8e  67 29 0b bb  30 2b 3c 46
|   92 fd ec f3  07 2f b3 65  cd 10 62 4b  e0 82 29 16
|   82 1e 09 49  80 26 6d 7f  07 35 b1 aa  67 ad c8 5e
|   32 86 5a b7  e1 b2 8e 7c  8a 54 d4 c9  87 f4 2d 1a
|   6e 50 2f d0  d1 29 ad 76  e4 1f 60 4b  d1 6d 75 3d
|   01 92 1c 48  b1 9e 13 b0  43 9e 4e ab  f9 74 78 b1
|   6d ce f1 f8  cc 04 4c be  80 c4 da da  3e a7 c8 6e
|   de fc 72 7b  08 07 73 e9  23 16 18 4e  50 d5 63 61
|   70 af 61 b4  46 2f 62 9c  43 3f 19 91  40 b0 94 94
|   89 2c a8 4e  a4 2c c9 98  73 cc e9 84  fe 62 b8 d0
|   9b 41 bf e9  60 fa 93 ce  6b 8b 42 f3  0f 3d d8 a1
|   0a b2 74 57  f5 dc 57 f9  4e af af 74  2d a0 88 cd
|   c2 0f 2a bd  c5 2e
| emitting length of IKEv2 Certificate Payload: 1067
|  payload after AUTH will be ISAKMP_NEXT_v2SA
| *****emit IKEv2 Authentication Payload:
|    next payload type: ISAKMP_NEXT_v2SA
|    critical bit: none
|    auth method: v2_AUTH_RSA
| emitting 192 zero bytes of fake rsa sig into IKEv2 Authentication Payload
| emitting length of IKEv2 Authentication Payload: 200
| empty esp_info, returning defaults
| *****emit IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2TSi
|    critical bit: none
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_P
|    prop #: 1
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_P
|    prop #: 2
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_P
|    prop #: 3
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    prop #: 4
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| emitting length of IKEv2 Security Association Payload: 156
| *****emit IKEv2 Traffic Selector Payload:
|    next payload type: ISAKMP_NEXT_v2TSr
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selector
| ipv4 low  5d b8 d8 22
| emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selector
| ipv4 high  5d b8 d8 22
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector Payload: 24
| *****emit IKEv2 Traffic Selector Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selector
| ipv4 low  0a 02 00 00
| emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selector
| ipv4 high  0a 02 ff ff
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector Payload: 24
| emitting 5 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 1536
| emitting length of ISAKMP Message: 1564
| data before encryption:
|   25 00 00 1c  03 00 00 00  63 61 72 6f  6c 40 73 74
|   72 6f 6e 67  73 77 61 6e  2e 6f 72 67  27 00 04 2b
|   04 30 82 04  22 30 82 03  0a a0 03 02  01 02 02 01
|   30 30 0d 06  09 2a 86 48  86 f7 0d 01  01 0b 05 00
|   30 45 31 0b  30 09 06 03  55 04 06 13  02 43 48 31
|   19 30 17 06  03 55 04 0a  13 10 4c 69  6e 75 78 20
|   73 74 72 6f  6e 67 53 77  61 6e 31 1b  30 19 06 03
|   55 04 03 13  12 73 74 72  6f 6e 67 53  77 61 6e 20
|   52 6f 6f 74  20 43 41 30  1e 17 0d 31  34 30 38 32
|   37 31 35 30  35 33 36 5a  17 0d 31 39  30 38 32 36
|   31 35 30 35  33 36 5a 30  5a 31 0b 30  09 06 03 55
|   04 06 13 02  43 48 31 19  30 17 06 03  55 04 0a 13
|   10 4c 69 6e  75 78 20 73  74 72 6f 6e  67 53 77 61
|   6e 31 11 30  0f 06 03 55  04 0b 13 08  52 65 73 65
|   61 72 63 68  31 1d 30 1b  06 03 55 04  03 14 14 63
|   61 72 6f 6c  40 73 74 72  6f 6e 67 73  77 61 6e 2e
|   6f 72 67 30  82 01 22 30  0d 06 09 2a  86 48 86 f7
|   0d 01 01 01  05 00 03 82  01 0f 00 30  82 01 0a 02
|   82 01 01 00  b7 f3 d4 37  17 ca df ec  38 02 e2 d4
|   86 7f 45 cb  8f 6b 99 be  e1 f8 92 49  3d b0 55 65
|   ab 97 0d e1  52 37 a2 c0  b7 e0 a0 ba  ed 29 a1 97
|   e2 2f 80 b7  cd 99 a2 5d  a6 75 b1 17  16 93 be f6
|   ac 57 96 23  f6 bb 47 de  c6 a3 f8 98  1b 99 ba cd
|   c4 2c 0f 36  10 e2 f4 95  0d 9a 84 08  bc 3b 7a 9a
|   7e 40 cc 05  28 2f a1 e2  69 13 03 5e  d3 45 20 87
|   9d e0 ee 14  fb 77 0f 2d  4a 07 0f 1a  a4 24 5a eb
|   48 20 a4 fd  4f a7 bf 1d  b1 cd 8d 1b  58 97 0f 59
|   94 7b 29 f2  04 98 8e 0f  d0 ea f5 7a  a1 fb 6d b9
|   e3 14 0f d3  51 bf cc 36  63 be ab 9d  14 66 50 67
|   f7 1a 53 45  16 68 31 66  7b 42 25 1b  98 96 d9 f1
|   57 b5 5c 08  5a 29 a7 26  ae 62 df df  3e 68 c0 c5
|   b3 d1 ba 11  ca 69 c9 f3  23 3a bc dc  8c 5f e5 f4
|   a3 31 39 65  b8 60 9f 58  55 ff 34 61  0d 5d a9 81
|   a8 28 64 44  b1 e6 b8 21  cd 7b 1c 51  a7 db 36 17
|   54 b5 d2 11  02 03 01 00  01 a3 82 01  06 30 82 01
|   02 30 09 06  03 55 1d 13  04 02 30 00  30 0b 06 03
|   55 1d 0f 04  04 03 02 03  a8 30 1d 06  03 55 1d 0e
|   04 16 04 14  5c 59 70 62  57 2d 2a 24  9c 5c 94 56
|   9b 89 5e e5  c5 05 b6 bd  30 6d 06 03  55 1d 23 04
|   66 30 64 80  14 5d a7 dd  70 06 51 32  7e e7 b6 6d
|   b3 b5 e5 e0  60 ea 2e 4d  ef a1 49 a4  47 30 45 31
|   0b 30 09 06  03 55 04 06  13 02 43 48  31 19 30 17
|   06 03 55 04  0a 13 10 4c  69 6e 75 78  20 73 74 72
|   6f 6e 67 53  77 61 6e 31  1b 30 19 06  03 55 04 03
|   13 12 73 74  72 6f 6e 67  53 77 61 6e  20 52 6f 6f
|   74 20 43 41  82 01 00 30  1f 06 03 55  1d 11 04 18
|   30 16 81 14  63 61 72 6f  6c 40 73 74  72 6f 6e 67
|   73 77 61 6e  2e 6f 72 67  30 39 06 03  55 1d 1f 04
|   32 30 30 30  2e a0 2c a0  2a 86 28 68  74 74 70 3a
|   2f 2f 63 72  6c 2e 73 74  72 6f 6e 67  73 77 61 6e
|   2e 6f 72 67  2f 73 74 72  6f 6e 67 73  77 61 6e 2e
|   63 72 6c 30  0d 06 09 2a  86 48 86 f7  0d 01 01 0b
|   05 00 03 82  01 01 00 55  a9 3c 34 0d  10 01 13 07
|   30 90 cb 03  91 7d 72 21  7e 25 38 30  1a 76 f4 aa
|   fc f3 ff 33  77 ba 56 86  4e 5c 1a 61  29 0b ea 80
|   08 1a 0a 99  3e bc 05 e8  1c d3 c8 9a  0f af 45 57
|   98 6c 87 92  d0 4d a5 32  8e 67 29 0b  bb 30 2b 3c
|   46 92 fd ec  f3 07 2f b3  65 cd 10 62  4b e0 82 29
|   16 82 1e 09  49 80 26 6d  7f 07 35 b1  aa 67 ad c8
|   5e 32 86 5a  b7 e1 b2 8e  7c 8a 54 d4  c9 87 f4 2d
|   1a 6e 50 2f  d0 d1 29 ad  76 e4 1f 60  4b d1 6d 75
|   3d 01 92 1c  48 b1 9e 13  b0 43 9e 4e  ab f9 74 78
|   b1 6d ce f1  f8 cc 04 4c  be 80 c4 da  da 3e a7 c8
|   6e de fc 72  7b 08 07 73  e9 23 16 18  4e 50 d5 63
|   61 70 af 61  b4 46 2f 62  9c 43 3f 19  91 40 b0 94
|   94 89 2c a8  4e a4 2c c9  98 73 cc e9  84 fe 62 b8
|   d0 9b 41 bf  e9 60 fa 93  ce 6b 8b 42  f3 0f 3d d8
|   a1 0a b2 74  57 f5 dc 57  f9 4e af af  74 2d a0 88
|   cd c2 0f 2a  bd c5 2e 21  00 00 c8 01  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 2c
|   00 00 9c 02  00 00 28 01  03 04 03 12  34 56 78 03
|   00 00 0c 01  00 00 0c 80  0e 00 80 03  00 00 08 03
|   00 00 02 00  00 00 08 05  00 00 00 02  00 00 28 02
|   03 04 03 12  34 56 78 03  00 00 0c 01  00 00 0c 80
|   0e 00 80 03  00 00 08 03  00 00 01 00  00 00 08 05
|   00 00 00 02  00 00 24 03  03 04 03 12  34 56 78 03
|   00 00 08 01  00 00 03 03  00 00 08 03  00 00 02 00
|   00 00 08 05  00 00 00 00  00 00 24 04  03 04 03 12
|   34 56 78 03  00 00 08 01  00 00 03 03  00 00 08 03
|   00 00 01 00  00 00 08 05  00 00 00 2d  00 00 18 01
|   00 00 00 07  00 00 10 00  00 ff ff 5d  b8 d8 22 5d
|   b8 d8 22 00  00 00 18 01  00 00 00 07  00 00 10 00
|   00 ff ff 0a  02 00 00 0a  02 ff ff 00  01 02 03 04
| data after encryption:
|   04 64 22 ca  bd 8e 1c 3e  68 57 42 0a  71 2c c0 97
|   44 e7 d8 17  b2 e9 29 61  7c 54 b5 d8  f0 13 b6 60
|   f0 72 68 c1  36 c2 a2 f5  97 15 5d 3f  be 4d 9f 78
|   bb ed df e2  fb 0f d5 89  46 a5 d2 fb  0e 7f a6 4a
|   1a c4 63 ba  f3 c6 13 de  17 af cc 05  40 7f 5c 33
|   e4 23 ce 11  e8 24 ed 1d  9c 21 e0 59  58 fb 82 a0
|   e2 96 b7 41  71 4d 0f 5b  87 80 c6 b0  c1 1f 0b 35
|   27 f6 76 68  ed 8d fe be  67 bf 68 95  37 47 99 0a
|   71 c4 0a 50  53 df 87 b4  8e d8 22 bf  31 58 ff f9
|   35 63 22 19  7c 1a e6 0f  ba 96 92 de  42 48 3d 36
|   48 a4 d6 81  09 b0 f1 7b  ef 89 32 aa  f6 d0 fb ed
|   64 be 5f df  59 87 77 f6  83 53 64 9c  34 fd 43 15
|   dc 13 9a 55  61 ac c7 bd  3e 04 45 d3  53 c5 56 61
|   10 f1 fe 3f  e0 7b 02 41  94 2a 48 32  8d 07 1d 81
|   c6 c2 5e a7  c9 85 18 0d  0a 1e 6f bc  18 3c 26 b7
|   15 06 06 04  4c 1d a2 ae  2a b7 81 ef  4d b7 12 9c
|   1f 54 02 ed  b8 ef 0a 6e  81 9e 2d 8b  7d 77 e9 08
|   ed b6 17 a5  20 56 57 86  ed ef 9b 01  16 40 d4 e8
|   6c cb 9e 2d  bc 36 b3 cb  a0 ad ca 9c  d9 f1 43 4d
|   04 2a c2 10  17 05 8e a9  41 5d ca 8e  69 28 36 8e
|   73 d0 51 fa  f5 e1 62 ef  94 ff b2 59  33 bc 11 59
|   19 96 12 9c  6d d6 06 f2  31 62 6e e9  e0 b1 e3 56
|   df af 54 60  a8 c9 4a 48  8c 12 fc bf  5c cb 9b f5
|   f7 05 df 65  dc a8 cf f6  32 79 48 42  f0 96 01 6d
|   48 15 45 23  d8 1d 98 34  7d 56 3f c7  6d 87 d6 f2
|   22 62 6f 1e  fd 94 8a 7a  67 08 46 43  41 42 79 54
|   a8 1b 95 f1  ac 88 e8 25  2c 0f 33 99  f6 b9 6d e6
|   6d 27 9f 3b  65 8a 6d ca  6b bb b3 6b  58 8d 93 a9
|   13 d4 d3 ba  cd 9e b9 f5  76 8a dc 7c  0c fc a5 90
|   81 fb b4 52  6d de fe 7d  7b 7c 5f f2  a3 b2 0a 7a
|   5d e7 7e 49  9c 2e 81 10  2e 1b d8 67  7c 41 b0 6a
|   c9 98 d2 f2  07 d6 ba 6f  7e a5 4f 0b  cc 6f ef 56
|   4a f2 4c f3  6f 30 8a d7  80 5c d5 7b  b1 ad 0d 7a
|   db ac 60 ec  69 15 1a 74  c4 f7 6e 49  c3 c9 e3 6d
|   f2 b4 16 a6  f7 a6 79 4e  51 d5 76 5c  32 da 11 67
|   21 c2 d8 75  c5 8b bf a0  d2 fc a1 9a  c3 2f f3 fd
|   ec 4a 0a bb  c4 64 80 97  f9 d6 79 80  27 b8 a0 e9
|   8c 1f 56 01  9b 12 e0 cf  ff 94 00 7a  5e 59 24 53
|   34 d5 b2 91  6f ea ef cd  fb f1 fc ce  8a f8 f9 d0
|   68 59 62 b4  a4 72 9b 87  ad 82 ec 7f  fe 84 e6 a5
|   27 aa b8 55  9d 35 5a c4  40 d0 17 e9  db e2 30 eb
|   c7 6b 10 75  dd b9 f8 2a  e5 a2 35 29  94 41 16 9c
|   c8 f5 45 b4  5c bf 89 7a  00 93 ca 48  b3 32 fc 1b
|   b3 64 fa c3  5a 0a ff 35  f0 c2 61 85  8c 49 36 f3
|   c2 47 92 72  15 9d e5 f8  31 2e 7e 3a  34 0d 6f 8d
|   3e d2 de a9  43 13 2b c6  d5 54 ee dd  de 50 54 9b
|   cb 6d bf 13  55 aa 94 a0  55 00 ff 4f  87 45 fa 2f
|   43 7a 74 7e  fb 7e 15 50  ba f4 d3 d1  66 6d b6 e1
|   63 bc 98 27  38 b7 14 d6  f1 42 0a 7d  2a 7b ae 72
|   12 35 ab 6b  ca 82 48 49  f8 28 fc 56  65 0f 7f 81
|   a2 25 9e 90  16 c1 60 e7  46 5a 7a 17  14 08 64 66
|   98 31 1e 71  c8 e3 44 7a  4a 35 d2 f6  f4 81 5b c9
|   4d 44 8d 59  a2 9a 31 86  3a 9f f8 91  3f e3 8d bf
|   9a ac e8 ea  71 79 5a 88  a0 ca 00 25  62 d8 c6 43
|   64 ed 2d 22  6d b9 8e e0  a4 07 27 e5  17 d9 55 1f
|   18 58 3b 75  e9 c8 9d 2e  be 0b d8 98  33 31 6f 3f
|   21 e6 2a 10  60 27 f1 9d  6c 6a 83 3a  c4 ba be 1f
|   91 9f 4f 9c  fa de ad 39  9a 54 77 ba  b2 c9 5a dd
|   6c 56 04 3a  fb fe 96 a3  52 31 bc 5d  56 e7 c8 c4
|   08 b4 9f fd  03 28 fd 86  d1 d5 dc b5  8a 4f 8f f4
|   dd 3a 10 89  16 08 ef 3d  df 3b 21 dc  03 cb ae fa
|   bd f8 0c d3  32 c3 8d a1  a4 85 30 7f  5a a7 6a 3d
|   54 04 26 f6  ff 40 ef 58  06 c1 12 cf  6e a5 05 56
|   23 81 48 48  9d d3 9e 82  07 bc 8e d8  2e 1c 75 fb
|   f7 0c 15 82  af b3 81 d8  a0 72 0f 61  ec 1c 38 a0
|   68 6b c5 dc  f3 c8 70 9d  ae 77 23 b4  ed 88 f0 57
|   27 d2 c9 39  93 53 56 11  65 37 20 2b  3a c6 79 be
|   02 2e 3c 4a  82 66 00 fa  a4 67 f7 99  17 4d 21 b2
|   bc 99 42 4d  c2 a9 e6 03  a3 ef f8 68  e4 cf c2 2f
|   a2 60 06 eb  17 24 ab c9  e7 ab 82 ec  0c b4 7d 3c
|   20 ad cd 0e  db bd 12 c3  53 78 aa 5c  b1 ca 97 4f
|   3f 65 1b 1f  d2 1b 00 36  0b 07 b3 6d  8a 06 f8 c8
|   24 aa 07 d1  65 ec 77 a7  8a b4 83 87  8e 18 32 d1
|   11 2d fb 89  2c 62 a4 d0  de 0e 98 a0  61 98 47 d6
|   c3 83 73 ab  28 1c 2d 45  89 de 84 d4  d7 c8 ea 62
|   1a 87 5f 43  cc 35 38 d1  c3 13 be 68  f2 d0 eb 73
|   fd 22 3d cd  b4 48 b9 9a  b4 88 40 84  52 be 1e 0f
|   77 b9 0e f4  50 9a 37 52  2d a9 fe be  6c 03 04 db
|   1a 4c 52 a8  c8 23 7f 4d  3f cc 0a 07  6e 77 5d 05
|   2a a4 bd aa  57 ad 31 d6  14 df 7b 22  2b 7d 1c 4d
|   41 e4 5f 9b  49 40 06 b5  fc 89 20 9b  6c 64 85 68
|   77 df 3c e5  51 10 3e ca  de 48 17 a6  c4 ac a1 64
|   ff ae 68 ef  b1 79 34 75  95 f9 b1 b1  6f bc 4c 07
|   ec 41 7c 69  86 ea f0 41  49 36 57 d7  82 a9 77 05
|   b4 82 66 72  0d 5f 58 b9  21 e4 55 f2  8c 08 13 09
|   c6 cb c7 94  6b 20 bc 7f  0d 7e 88 00  34 34 58 8f
|   92 00 a3 37  85 82 7f 7c  3b 5e 86 9a  7a 11 95 f2
|   13 b5 db d9  2e 15 7f 48  01 c3 a6 64  83 12 3f ac
|   80 27 f2 41  aa 1e bd 6e  1b 4d 09 02  ca cc b2 a9
|   38 8e 27 66  50 af 65 e4  f9 a1 c8 5e  c2 c0 57 88
|   c0 3d 76 a1  ec 5f 7b 24  cf 1c 65 f4  ee 61 95 4f
|   45 ee 66 c6  48 2a 2a b7  d9 33 8e b6  79 5c cd e5
|   40 04 af 99  3a e0 1d f7  e9 ab 69 e4  98 b2 7b 51
|   da 97 56 57  58 13 03 a6  f2 3b ba b6  1d e2 c8 67
| complete v2 state transition with STF_OK
./certificateselfI2 transition from state STATE_PARENT_I1 to state STATE_PARENT_I2
./certificateselfI2 STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=aes_128 integ=sha1_96 prf=oakley_sha group=modp2048} (msgid: 00000001)
| sending reply packet to 132.213.238.7:500 (from port 500)
sending 1564 bytes for STATE_PARENT_I1 through eth0:500 to 132.213.238.7:500 (using #2)
|   80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   2e 20 23 08  00 00 00 01  00 00 06 1c  23 00 06 00
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   04 64 22 ca  bd 8e 1c 3e  68 57 42 0a  71 2c c0 97
|   44 e7 d8 17  b2 e9 29 61  7c 54 b5 d8  f0 13 b6 60
|   f0 72 68 c1  36 c2 a2 f5  97 15 5d 3f  be 4d 9f 78
|   bb ed df e2  fb 0f d5 89  46 a5 d2 fb  0e 7f a6 4a
|   1a c4 63 ba  f3 c6 13 de  17 af cc 05  40 7f 5c 33
|   e4 23 ce 11  e8 24 ed 1d  9c 21 e0 59  58 fb 82 a0
|   e2 96 b7 41  71 4d 0f 5b  87 80 c6 b0  c1 1f 0b 35
|   27 f6 76 68  ed 8d fe be  67 bf 68 95  37 47 99 0a
|   71 c4 0a 50  53 df 87 b4  8e d8 22 bf  31 58 ff f9
|   35 63 22 19  7c 1a e6 0f  ba 96 92 de  42 48 3d 36
|   48 a4 d6 81  09 b0 f1 7b  ef 89 32 aa  f6 d0 fb ed
|   64 be 5f df  59 87 77 f6  83 53 64 9c  34 fd 43 15
|   dc 13 9a 55  61 ac c7 bd  3e 04 45 d3  53 c5 56 61
|   10 f1 fe 3f  e0 7b 02 41  94 2a 48 32  8d 07 1d 81
|   c6 c2 5e a7  c9 85 18 0d  0a 1e 6f bc  18 3c 26 b7
|   15 06 06 04  4c 1d a2 ae  2a b7 81 ef  4d b7 12 9c
|   1f 54 02 ed  b8 ef 0a 6e  81 9e 2d 8b  7d 77 e9 08
|   ed b6 17 a5  20 56 57 86  ed ef 9b 01  16 40 d4 e8
|   6c cb 9e 2d  bc 36 b3 cb  a0 ad ca 9c  d9 f1 43 4d
|   04 2a c2 10  17 05 8e a9  41 5d ca 8e  69 28 36 8e
|   73 d0 51 fa  f5 e1 62 ef  94 ff b2 59  33 bc 11 59
|   19 96 12 9c  6d d6 06 f2  31 62 6e e9  e0 b1 e3 56
|   df af 54 60  a8 c9 4a 48  8c 12 fc bf  5c cb 9b f5
|   f7 05 df 65  dc a8 cf f6  32 79 48 42  f0 96 01 6d
|   48 15 45 23  d8 1d 98 34  7d 56 3f c7  6d 87 d6 f2
|   22 62 6f 1e  fd 94 8a 7a  67 08 46 43  41 42 79 54
|   a8 1b 95 f1  ac 88 e8 25  2c 0f 33 99  f6 b9 6d e6
|   6d 27 9f 3b  65 8a 6d ca  6b bb b3 6b  58 8d 93 a9
|   13 d4 d3 ba  cd 9e b9 f5  76 8a dc 7c  0c fc a5 90
|   81 fb b4 52  6d de fe 7d  7b 7c 5f f2  a3 b2 0a 7a
|   5d e7 7e 49  9c 2e 81 10  2e 1b d8 67  7c 41 b0 6a
|   c9 98 d2 f2  07 d6 ba 6f  7e a5 4f 0b  cc 6f ef 56
|   4a f2 4c f3  6f 30 8a d7  80 5c d5 7b  b1 ad 0d 7a
|   db ac 60 ec  69 15 1a 74  c4 f7 6e 49  c3 c9 e3 6d
|   f2 b4 16 a6  f7 a6 79 4e  51 d5 76 5c  32 da 11 67
|   21 c2 d8 75  c5 8b bf a0  d2 fc a1 9a  c3 2f f3 fd
|   ec 4a 0a bb  c4 64 80 97  f9 d6 79 80  27 b8 a0 e9
|   8c 1f 56 01  9b 12 e0 cf  ff 94 00 7a  5e 59 24 53
|   34 d5 b2 91  6f ea ef cd  fb f1 fc ce  8a f8 f9 d0
|   68 59 62 b4  a4 72 9b 87  ad 82 ec 7f  fe 84 e6 a5
|   27 aa b8 55  9d 35 5a c4  40 d0 17 e9  db e2 30 eb
|   c7 6b 10 75  dd b9 f8 2a  e5 a2 35 29  94 41 16 9c
|   c8 f5 45 b4  5c bf 89 7a  00 93 ca 48  b3 32 fc 1b
|   b3 64 fa c3  5a 0a ff 35  f0 c2 61 85  8c 49 36 f3
|   c2 47 92 72  15 9d e5 f8  31 2e 7e 3a  34 0d 6f 8d
|   3e d2 de a9  43 13 2b c6  d5 54 ee dd  de 50 54 9b
|   cb 6d bf 13  55 aa 94 a0  55 00 ff 4f  87 45 fa 2f
|   43 7a 74 7e  fb 7e 15 50  ba f4 d3 d1  66 6d b6 e1
|   63 bc 98 27  38 b7 14 d6  f1 42 0a 7d  2a 7b ae 72
|   12 35 ab 6b  ca 82 48 49  f8 28 fc 56  65 0f 7f 81
|   a2 25 9e 90  16 c1 60 e7  46 5a 7a 17  14 08 64 66
|   98 31 1e 71  c8 e3 44 7a  4a 35 d2 f6  f4 81 5b c9
|   4d 44 8d 59  a2 9a 31 86  3a 9f f8 91  3f e3 8d bf
|   9a ac e8 ea  71 79 5a 88  a0 ca 00 25  62 d8 c6 43
|   64 ed 2d 22  6d b9 8e e0  a4 07 27 e5  17 d9 55 1f
|   18 58 3b 75  e9 c8 9d 2e  be 0b d8 98  33 31 6f 3f
|   21 e6 2a 10  60 27 f1 9d  6c 6a 83 3a  c4 ba be 1f
|   91 9f 4f 9c  fa de ad 39  9a 54 77 ba  b2 c9 5a dd
|   6c 56 04 3a  fb fe 96 a3  52 31 bc 5d  56 e7 c8 c4
|   08 b4 9f fd  03 28 fd 86  d1 d5 dc b5  8a 4f 8f f4
|   dd 3a 10 89  16 08 ef 3d  df 3b 21 dc  03 cb ae fa
|   bd f8 0c d3  32 c3 8d a1  a4 85 30 7f  5a a7 6a 3d
|   54 04 26 f6  ff 40 ef 58  06 c1 12 cf  6e a5 05 56
|   23 81 48 48  9d d3 9e 82  07 bc 8e d8  2e 1c 75 fb
|   f7 0c 15 82  af b3 81 d8  a0 72 0f 61  ec 1c 38 a0
|   68 6b c5 dc  f3 c8 70 9d  ae 77 23 b4  ed 88 f0 57
|   27 d2 c9 39  93 53 56 11  65 37 20 2b  3a c6 79 be
|   02 2e 3c 4a  82 66 00 fa  a4 67 f7 99  17 4d 21 b2
|   bc 99 42 4d  c2 a9 e6 03  a3 ef f8 68  e4 cf c2 2f
|   a2 60 06 eb  17 24 ab c9  e7 ab 82 ec  0c b4 7d 3c
|   20 ad cd 0e  db bd 12 c3  53 78 aa 5c  b1 ca 97 4f
|   3f 65 1b 1f  d2 1b 00 36  0b 07 b3 6d  8a 06 f8 c8
|   24 aa 07 d1  65 ec 77 a7  8a b4 83 87  8e 18 32 d1
|   11 2d fb 89  2c 62 a4 d0  de 0e 98 a0  61 98 47 d6
|   c3 83 73 ab  28 1c 2d 45  89 de 84 d4  d7 c8 ea 62
|   1a 87 5f 43  cc 35 38 d1  c3 13 be 68  f2 d0 eb 73
|   fd 22 3d cd  b4 48 b9 9a  b4 88 40 84  52 be 1e 0f
|   77 b9 0e f4  50 9a 37 52  2d a9 fe be  6c 03 04 db
|   1a 4c 52 a8  c8 23 7f 4d  3f cc 0a 07  6e 77 5d 05
|   2a a4 bd aa  57 ad 31 d6  14 df 7b 22  2b 7d 1c 4d
|   41 e4 5f 9b  49 40 06 b5  fc 89 20 9b  6c 64 85 68
|   77 df 3c e5  51 10 3e ca  de 48 17 a6  c4 ac a1 64
|   ff ae 68 ef  b1 79 34 75  95 f9 b1 b1  6f bc 4c 07
|   ec 41 7c 69  86 ea f0 41  49 36 57 d7  82 a9 77 05
|   b4 82 66 72  0d 5f 58 b9  21 e4 55 f2  8c 08 13 09
|   c6 cb c7 94  6b 20 bc 7f  0d 7e 88 00  34 34 58 8f
|   92 00 a3 37  85 82 7f 7c  3b 5e 86 9a  7a 11 95 f2
|   13 b5 db d9  2e 15 7f 48  01 c3 a6 64  83 12 3f ac
|   80 27 f2 41  aa 1e bd 6e  1b 4d 09 02  ca cc b2 a9
|   38 8e 27 66  50 af 65 e4  f9 a1 c8 5e  c2 c0 57 88
|   c0 3d 76 a1  ec 5f 7b 24  cf 1c 65 f4  ee 61 95 4f
|   45 ee 66 c6  48 2a 2a b7  d9 33 8e b6  79 5c cd e5
|   40 04 af 99  3a e0 1d f7  e9 ab 69 e4  98 b2 7b 51
|   da 97 56 57  58 13 03 a6  f2 3b ba b6  1d e2 c8 67
|   b0 a8 65 15  ab ab 08 89  76 51 bb 4b
./certificateselfI2 deleting connection
| pass 0: considering CHILD SAs to delete
./certificateselfI2 deleting state #2 (STATE_PARENT_I2)
| received request to delete child state
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
./certificateselfI2 deleting state #1 (STATE_PARENT_I2)
| considering request to delete IKE parent state
| sending IKE SA delete request
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   64 0a 06 43  5c 7c 4b 31
|    next payload type: ISAKMP_NEXT_v2E
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_INFORMATIONAL
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 02
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2D
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
| *****emit IKEv2 Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    critical bit: none
|    protocol ID: 1
|    SPI size: 0
|    number of SPIs: 0
| emitting length of IKEv2 Delete Payload: 8
| emitting 8 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 48
| emitting length of ISAKMP Message: 76
| data before encryption:
|   00 00 00 08  01 00 00 00  00 01 02 03  04 05 06 07
| data after encryption:
|   23 56 8c 9a  7c 01 7c 8e  c1 2a 91 9a  c4 da 80 c2
sending 76 bytes for ikev2_delete_out through eth0:500 to 132.213.238.7:500 (using #1)
|   80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   2e 20 25 08  00 00 00 02  00 00 00 4c  2a 00 00 30
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   23 56 8c 9a  7c 01 7c 8e  c1 2a 91 9a  c4 da 80 c2
|   5e c0 be 04  65 78 5e 79  df 5f d5 d2
| pass 1: considering PARENT SAs to delete
./certificateselfI2 deleting state #1 (STATE_IKESA_DEL)
| considering request to delete IKE parent state
| now deleting the IKE (or parent) state
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
./certificateselfI2 leak: request packet for informational exchange, item size: X
./certificateselfI2 leak: reply packet, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_prop, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: 4 * sa copy attrs array, item size: X
./certificateselfI2 leak: sa copy trans array, item size: X
./certificateselfI2 leak: sa copy prop array, item size: X
./certificateselfI2 leak: sa copy prop conj array, item size: X
./certificateselfI2 leak: sa copy prop_conj, item size: X
./certificateselfI2 leak: saved first received packet, item size: X
./certificateselfI2 leak: st_nr in duplicate_state, item size: X
./certificateselfI2 leak: st_ni in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_pr in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_pi in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_er in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_ei in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_ar in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_ai in duplicate_state, item size: X
./certificateselfI2 leak: st_skey_d in duplicate_state, item size: X
./certificateselfI2 leak: st_skeyseed in duplicate_state, item size: X
./certificateselfI2 leak: st_enc_key in duplicate_state, item size: X
./certificateselfI2 leak: struct state in new_state(), item size: X
./certificateselfI2 leak: calculated skey_prshared secret, item size: X
./certificateselfI2 leak: calculated skey_pishared secret, item size: X
./certificateselfI2 leak: calculated skey_ershared secret, item size: X
./certificateselfI2 leak: calculated skey_eishared secret, item size: X
./certificateselfI2 leak: calculated skey_arshared secret, item size: X
./certificateselfI2 leak: calculated skey_aishared secret, item size: X
./certificateselfI2 leak: calculated skey_dshared secret, item size: X
./certificateselfI2 leak: calculated sharedshared secret, item size: X
./certificateselfI2 leak: ikev2_inR1outI2 KE, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_prop, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: nonce, item size: X
./certificateselfI2 leak: Gr, item size: X
./certificateselfI2 leak: saved first packet, item size: X
./certificateselfI2 leak: sa in main_outI1, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_prop, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: initiator nonce, item size: X
./certificateselfI2 leak: long term secret, item size: X
./certificateselfI2 leak: saved gi value, item size: X
./certificateselfI2 leak: msg_digest, item size: X
./certificateselfI2 leak: ikev2_outI1 KE, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_prop, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: db_attrs, item size: X
./certificateselfI2 leak: db_v2_trans, item size: X
./certificateselfI2 leak: db_v2_prop_conj, item size: X
./certificateselfI2 leak: 12 * sa copy attrs array, item size: X
./certificateselfI2 leak: sa copy trans array, item size: X
./certificateselfI2 leak: sa copy prop array, item size: X
./certificateselfI2 leak: sa copy prop conj array, item size: X
./certificateselfI2 leak: sa copy prop_conj, item size: X
./certificateselfI2 leak: struct state in new_state(), item size: X
./certificateselfI2 leak: issuer dn, item size: X
./certificateselfI2 leak: keep id name, item size: X
./certificateselfI2 leak: pubkey entry, item size: X
./certificateselfI2 leak: pubkey, item size: X
./certificateselfI2 leak: issuer dn, item size: X
./certificateselfI2 leak: keep id name, item size: X
./certificateselfI2 leak: pubkey entry, item size: X
./certificateselfI2 leak: pubkey, item size: X
./certificateselfI2 leak: certificate filename, item size: X
./certificateselfI2 leak: 2 * id list, item size: X
./certificateselfI2 leak: secret, item size: X
./certificateselfI2 leak: policies path, item size: X
./certificateselfI2 leak: ocspcerts path, item size: X
./certificateselfI2 leak: aacerts path, item size: X
./certificateselfI2 leak: certs path, item size: X
./certificateselfI2 leak: private path, item size: X
./certificateselfI2 leak: crls path, item size: X
./certificateselfI2 leak: cacert path, item size: X
./certificateselfI2 leak: acert path, item size: X
./certificateselfI2 leak: override ipsec.d, item size: X
./certificateselfI2 leak: 2 * hasher name, item size: X
./certificateselfI2 leak: policies path, item size: X
./certificateselfI2 leak: ocspcerts path, item size: X
./certificateselfI2 leak: aacerts path, item size: X
./certificateselfI2 leak: certs path, item size: X
./certificateselfI2 leak: private path, item size: X
./certificateselfI2 leak: crls path, item size: X
./certificateselfI2 leak: cacert path, item size: X
./certificateselfI2 leak: acert path, item size: X
./certificateselfI2 leak: default conf var_dir, item size: X
./certificateselfI2 leak: default conf conffile, item size: X
./certificateselfI2 leak: default conf ipsecd_dir, item size: X
./certificateselfI2 leak: default conf ipsec_conf_dir, item size: X
./certificateselfI2 leak detective found Z leaks, total size X
