./davecertI2 ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
./davecertI2 ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
./davecertI2 ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
./davecertI2 adjusting ipsec.d to ../samples/davecert
./davecertI2 loading secrets from "../samples/davecert.secrets"
./davecertI2   loaded private key file '../samples/davecert/private/daveKey.pem' (1679 bytes)
./davecertI2 loaded private key for keyid: PPK_RSA:AwEAAeOoT
| processing whack message of size: A
| processing whack message of size: A
processing whack msg time: X size: Y
| find_host_pair: looking for me=<none>:500 %any him=<none>:500 any-match
| find_host_pair: concluded with <none>
| found_host_pair_conn (check_connection_end): %any:500 %any/%any:500 -> hp:none
| Added new connection home with policy RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
./davecertI2   loading certificate from daveCert.pem
./davecertI2   loaded host cert file '../samples/davecert/certs/daveCert.pem' (1489 bytes)
| certificate is valid
| counting wild cards for C=CA, ST=ON, L=Ottawa, O=Xelerance Corporation, OU=Openswan, CN=dave@openswan.org is 0
| counting wild cards for @moon.strongswan.org is 0
| orient home checking against if: eth0 (AF_INET:0.0.0.0:500)
| orient home matching on public/private keys: this=no[%address] that=yes[%defaultroute]
|   orient home matched on that having private key
|   picking maching interface for family[2,2]: AF_INET resulted in: 0.0.0.0
|   orient home finished with: 1 [0.0.0.0]
| find_host_pair: looking for me=<invalid>:500 %address him=132.213.238.7:500 exact-match
| find_host_pair: concluded with <none>
| connect_to_host_pair: <invalid>:500 %address 132.213.238.7:500 -> hp:none
| find_ID_host_pair: looking for me=C=CA, ST=ON, L=Ottawa, O=Xelerance Corporation, OU=Openswan, CN=dave@openswan.org him=@moon.strongswan.org (exact)
|   concluded with <none>
./davecertI2 adding connection: "home"
| %any[C=CA, ST=ON, L=Ottawa, O=Xelerance Corporation, OU=Openswan, CN=dave@openswan.org]...132.213.238.7[@moon.strongswan.org]===10.2.0.0/16
| ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1; policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|   orient home finished with: 1 [0.0.0.0]
RC=0 "home": %any[C=CA, ST=ON, L=Ottawa, O=Xelerance Corporation, OU=Openswan, CN=dave@openswan.org]...132.213.238.7[@moon.strongswan.org]===10.2.0.0/16; unrouted; eroute owner: #0
RC=0 "home":     myip=unset; hisip=unset; mycert=daveCert.pem;
RC=0 "home":   CAs: 'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'...'%any'
RC=0 "home":   ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1
RC=0 "home":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK+lKOD+rKOD; prio: 16,0; interface: eth0; kind=CK_PERMANENT
| Changed path to directory '../samples/davecert/cacerts'
./davecertI2   loaded CA cert file 'strongswanCert.pem' (1350 bytes)
| creating state object #1 at Z
| orient home checking against if: eth0 (AF_INET:0.0.0.0:500)
| orient home matching on public/private keys: this=yes[%defaultroute] that=no[%address]
|   orient home matched on this having private key
|   picking maching interface for family[2,2]: AF_INET resulted in: 0.0.0.0
|   orient home finished with: 1 [0.0.0.0]
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| inserting state object #1 bucket: 4
./davecertI2 initiating v2 parent SA
./davecertI2 STATE_PARENT_I1: initiate
sending 836 bytes for ikev2_parent_outI1_common through eth0:500 to 132.213.238.7:500 (using #1)
|   8d 0e 0f 10  11 12 13 14  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 03 44  22 00 01 fc
|   02 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  02 00 00 2c
|   02 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 28  03 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 02  00 00 00 08  04 00 00 0e
|   02 00 00 28  04 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 2c  05 01 00 04
|   03 00 00 0c  01 00 00 0c  80 0e 00 80  03 00 00 08
|   03 00 00 02  03 00 00 08  02 00 00 02  00 00 00 08
|   04 00 00 05  02 00 00 2c  06 01 00 04  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  07 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  08 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  09 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 02  02 00 00 28  0a 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 02
|   02 00 00 2c  0b 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 02  00 00 00 2c
|   0c 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 02  28 00 01 08  00 0e 00 00
|   3d a6 6a 81  e2 92 09 be  18 4f a0 1e  5c ed ea 7c
|   7d 7b 3a 21  3e 15 0d 53  5d 17 6a be  1b c5 70 ab
|   34 47 bc 09  14 7c aa 91  9c 8f 81 dc  1e f9 87 cd
|   6a ec fa f3  a5 9e 37 bc  ac 3d fd e1  32 8e e8 b3
|   fe d3 8b f4  7b 50 34 13  33 7a 93 ea  e9 3c 0e 8b
|   bd 48 18 9c  9e 03 70 f2  55 ce 45 22  9f c7 c9 48
|   43 a3 e2 64  b5 5d 43 38  c8 fe f1 d3  06 43 f0 0a
|   e8 6d 61 8c  60 78 d9 98  d3 1b 3b 5e  f5 a6 e8 2f
|   ef 56 ac b4  33 bd 1e 62  b2 3e 0b 17  af 6c b8 31
|   08 d7 19 5a  7b c4 54 c2  13 47 98 c2  cc d2 16 29
|   75 6c 03 fb  1e 9c 9d 21  0c a1 e6 c2  f3 f2 49 2c
|   f6 06 73 c1  96 1e ce 58  81 01 1c cb  16 dc f9 fc
|   c7 93 08 75  58 16 57 71  69 96 66 b7  a9 81 7f f7
|   37 4d 7c 41  38 62 a6 39  00 81 ca 3d  1d fc f7 b5
|   08 38 d4 34  70 22 6c 21  d2 5b 20 a1  d2 ba 2a d1
|   89 f3 20 79  ce ac 1e c2  ec 7d ae 76  94 40 39 a0
|   2b 00 00 14  20 98 9d 37  a8 14 a6 4d  8f f0 7c 08
|   d3 20 e9 e3  00 00 00 10  4f 45 70 6c  75 74 6f 75
|   6e 69 74 30
./davecertI2 transition from state STATE_IKEv2_START to state STATE_PARENT_I1
./davecertI2 STATE_PARENT_I1: sent v2I1, expected v2R1 (msgid: 00000000)
| *received 376 bytes from 132.213.238.7:500 on eth0 (port=500)
|   8d 0e 0f 10  11 12 13 14  5d 73 ce 75  3d b1 db 6d
|   21 20 22 20  00 00 00 00  00 00 01 78  22 00 00 30
|   00 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  28 00 01 08
|   00 0e 00 00  a5 9a 13 6c  b8 87 48 57  e1 22 6e a0
|   b8 55 c2 00  31 15 65 84  8b f9 dc a4  5f 49 d4 c5
|   f0 98 8e 9b  31 85 6e 27  5a c2 75 09  07 37 05 b5
|   b1 53 18 07  81 e8 1d 07  c6 19 1c de  dc 1f 2c 26
|   d2 0b 59 f9  67 6a ee 3c  e5 fa 72 3f  54 96 1e 7d
|   8e d0 30 08  0b ed 95 b0  65 2f 5c a6  36 7e 92 2d
|   da cb 88 54  e3 97 fa 16  6f 9e 7c a6  0c 43 2f 29
|   be 2c a4 55  68 01 45 bc  56 a9 84 b9  2b 1b bf 9a
|   fc 84 67 5f  d3 04 79 90  b7 fa 89 5b  04 06 d5 9a
|   50 92 16 4b  d6 33 40 be  2a 44 94 74  33 a7 a5 c1
|   1f 88 5b eb  4e d2 bb 94  b9 22 db e3  b6 5a 8c f9
|   d6 43 5d 5e  5d c9 19 b8  c8 81 53 01  95 09 02 7b
|   c0 2a b0 c8  5d 2c 69 78  6c e8 f6 5d  e4 90 43 83
|   fd f7 98 5e  cc 92 5c 79  7b 62 ae 98  db 4f 7f e0
|   68 7c cd 29  69 0a ad a3  e8 37 d7 41  b4 79 b3 a5
|   38 a2 8d a0  69 ff bd aa  ba d5 54 70  40 ab b5 fc
|   26 6d ae ce  2b 00 00 14  c6 ba 31 9f  88 5b e7 b7
|   a2 93 85 dc  bb c6 15 84  00 00 00 10  4f 45 70 6c
|   75 74 6f 75  6e 69 74 30
| **parse ISAKMP Message:
|    initiator cookie:
|   8d 0e 0f 10  11 12 13 14
|    responder cookie:
|   5d 73 ce 75  3d b1 db 6d
|    next payload type: ISAKMP_NEXT_v2SA
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_SA_INIT
|    flags: ISAKMP_FLAG_RESPONSE
|    message ID:  00 00 00 00
|    length: 376
|  processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34), msgid: 00000000
| I am IKE SA Initiator
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  5d 73 ce 75  3d b1 db 6d
| state hash entry 15
| v2 state object not found
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| v2 peer and cookies match on #1
| v2 state object #1 (home) found, in STATE_PARENT_I1
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  5d 73 ce 75  3d b1 db 6d
| state hash entry 15
| inserting state object #1 bucket: 15
| state found and its state is:STATE_PARENT_I1 msgid: 00000
| ***parse IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2KE
|    critical bit: none
|    length: 48
| processing payload: ISAKMP_NEXT_v2SA (len=48)
| ***parse IKEv2 Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_v2Ni
|    critical bit: none
|    length: 264
|    transform type: 14
| processing payload: ISAKMP_NEXT_v2KE (len=264)
| ***parse IKEv2 Nonce Payload:
|    next payload type: ISAKMP_NEXT_v2V
|    critical bit: none
|    length: 20
| processing payload: ISAKMP_NEXT_v2Ni (len=20)
| ***parse IKEv2 Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    critical bit: none
|    length: 16
| processing payload: ISAKMP_NEXT_v2V (len=16)
| considering state entry: 0
| Now lets proceed with state specific processing
| ikev2 parent inR1: calculating g^{xy} in order to send I2
| ****parse IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    length: 44
|    prop #: 1
|    proto ID: 1
|    spi size: 0
|    # transforms: 4
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    length: 12
|    transform type: 1
|    transform ID: 12
| ******parse IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    length: 8
|    transform type: 3
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    length: 8
|    transform type: 2
|    transform ID: 2
| *****parse IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    length: 8
|    transform type: 4
|    transform ID: 14
| ikev2 parent SA details
| ikev2 I 0x8d0e0f1011121314 0x5d73ce753db1db6d sha1:0x4ea8e662b07cdd430f6944c6723e4b82d5722418 aes128:0x3f44bf47cafd8150591deb088199fcbf
| ikev2 R 0x8d0e0f1011121314 0x5d73ce753db1db6d sha1:0x515b0bd22e6d76b34fdb760aa7bfad80b109b75d aes128:0xbedb67ec7dc3d00cccac42e70cd63bde
| duplicating state object #1
| creating state object #2 at Z
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  5d 73 ce 75  3d b1 db 6d
| state hash entry 15
| inserting state object #2 bucket: 15
| **emit ISAKMP Message:
|    initiator cookie:
|   8d 0e 0f 10  11 12 13 14
|    responder cookie:
|   5d 73 ce 75  3d b1 db 6d
|    next payload type: ISAKMP_NEXT_v2E
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_AUTH
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 01
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2IDi
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
| IKEv2 thinking whether to send my certificate:
|  my policy has  RSASIG, the policy is : RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|  sendcert: CERT_ALWAYSSEND and I did not get a certificate request
|  so send cert.
| *****emit IKEv2 Identification Payload:
|    next payload type: ISAKMP_NEXT_v2CERT
|    critical bit: none
|    id_type: ID_DER_ASN1_DN
| emitting 124 raw bytes of my identity into IKEv2 Identification Payload
| my identity  30 7a 31 0b  30 09 06 03  55 04 06 13  02 43 41 31
|   0b 30 09 06  03 55 04 08  0c 02 4f 4e  31 0f 30 0d
|   06 03 55 04  07 0c 06 4f  74 74 61 77  61 31 1e 30
|   1c 06 03 55  04 0a 0c 15  58 65 6c 65  72 61 6e 63
|   65 20 43 6f  72 70 6f 72  61 74 69 6f  6e 31 11 30
|   0f 06 03 55  04 0b 0c 08  4f 70 65 6e  73 77 61 6e
|   31 1a 30 18  06 03 55 04  03 0c 11 64  61 76 65 40
|   6f 70 65 6e  73 77 61 6e  2e 6f 72 67
| emitting length of IKEv2 Identification Payload: 132
| idhash calc pi  cc 07 97 44  b4 a3 4e 8a  0d 2f 27 8b  ee 06 6d 07
|   a5 a5 75 2e
| idhash calc I2  09 00 00 00  30 7a 31 0b  30 09 06 03  55 04 06 13
|   02 43 41 31  0b 30 09 06  03 55 04 08  0c 02 4f 4e
|   31 0f 30 0d  06 03 55 04  07 0c 06 4f  74 74 61 77
|   61 31 1e 30  1c 06 03 55  04 0a 0c 15  58 65 6c 65
|   72 61 6e 63  65 20 43 6f  72 70 6f 72  61 74 69 6f
|   6e 31 11 30  0f 06 03 55  04 0b 0c 08  4f 70 65 6e
|   73 77 61 6e  31 1a 30 18  06 03 55 04  03 0c 11 64
|   61 76 65 40  6f 70 65 6e  73 77 61 6e  2e 6f 72 67
| Thinking about sending a certificate request (CERTREQ)
|   my policy is : RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|  my next payload will not be a certificate request
| I did not send a certificate request (CERTREQ) because
|   no known CA for the other end
| I am sending my certificate
| *****emit IKEv2 Certificate Payload:
|    next payload type: ISAKMP_NEXT_v2AUTH
|    critical bit: none
|    ikev2 cert encoding: CERT_X509_SIGNATURE
| emitting 1059 raw bytes of CERT into IKEv2 Certificate Payload
| CERT  30 82 04 1f  30 82 03 07  a0 03 02 01  02 02 01 33
|   30 0d 06 09  2a 86 48 86  f7 0d 01 01  0b 05 00 30
|   45 31 0b 30  09 06 03 55  04 06 13 02  43 48 31 19
|   30 17 06 03  55 04 0a 13  10 4c 69 6e  75 78 20 73
|   74 72 6f 6e  67 53 77 61  6e 31 1b 30  19 06 03 55
|   04 03 13 12  73 74 72 6f  6e 67 53 77  61 6e 20 52
|   6f 6f 74 20  43 41 30 1e  17 0d 31 35  30 37 33 30
|   31 38 33 36  31 35 5a 17  0d 31 38 30  35 31 39 31
|   38 33 36 31  35 5a 30 7a  31 0b 30 09  06 03 55 04
|   06 13 02 43  41 31 0b 30  09 06 03 55  04 08 0c 02
|   4f 4e 31 0f  30 0d 06 03  55 04 07 0c  06 4f 74 74
|   61 77 61 31  1e 30 1c 06  03 55 04 0a  0c 15 58 65
|   6c 65 72 61  6e 63 65 20  43 6f 72 70  6f 72 61 74
|   69 6f 6e 31  11 30 0f 06  03 55 04 0b  0c 08 4f 70
|   65 6e 73 77  61 6e 31 1a  30 18 06 03  55 04 03 0c
|   11 64 61 76  65 40 6f 70  65 6e 73 77  61 6e 2e 6f
|   72 67 30 82  01 22 30 0d  06 09 2a 86  48 86 f7 0d
|   01 01 01 05  00 03 82 01  0f 00 30 82  01 0a 02 82
|   01 01 00 e3  a8 4c c6 cc  c7 e3 b7 7c  e7 4f 15 4b
|   04 ca fa cb  06 46 c0 dc  08 c1 c8 aa  5d 06 b7 7c
|   55 41 ab cf  a8 00 a9 f3  8a 50 da a4  c4 2c 3e 45
|   e0 f3 b7 91  28 2f d3 b8  89 cf e2 c2  33 9a 9d 04
|   87 3c 9c c3  cd 94 7f 51  70 3c 7f da  9b 6d 5e 41
|   1d b3 6c 9e  84 76 c2 d4  97 21 fb 4b  86 9b 10 3b
|   43 74 42 94  2d e0 bd 2b  d7 74 0e 70  99 3a c1 06
|   f2 b6 45 ab  0c cc 1e bf  90 36 80 08  e0 d8 ed 10
|   c7 a6 e3 df  26 1d 95 73  db e6 f0 50  6c 17 b8 6e
|   77 fc 54 c9  21 1e af 1a  2b 4a 5d d3  b0 7b 5d c5
|   90 b8 01 14  10 85 bc 86  c2 5e 45 73  d8 e7 a6 47
|   60 5c ee 85  80 f4 49 b3  df e2 8d 50  b6 d5 ba f8
|   79 09 53 55  01 31 57 16  ec bc e2 77  48 0f e2 c8
|   4c ed 69 a9  d8 f1 81 0e  ea c3 3e 7d  24 c8 bf 75
|   05 88 2d e7  ed c5 cb 29  ce ec ef 57  85 f9 f4 7f
|   37 c7 a7 b8  79 47 ff ea  68 5c a8 73  dc 80 e7 b9
|   c7 ec 67 02  03 01 00 01  a3 81 e4 30  81 e1 30 09
|   06 03 55 1d  13 04 02 30  00 30 0b 06  03 55 1d 0f
|   04 04 03 02  03 a8 30 1d  06 03 55 1d  0e 04 16 04
|   14 c2 64 69  e8 dc 88 e3  23 58 47 07  86 4b 5e d4
|   b3 ea bc a7  10 30 6d 06  03 55 1d 23  04 66 30 64
|   80 14 5d a7  dd 70 06 51  32 7e e7 b6  6d b3 b5 e5
|   e0 60 ea 2e  4d ef a1 49  a4 47 30 45  31 0b 30 09
|   06 03 55 04  06 13 02 43  48 31 19 30  17 06 03 55
|   04 0a 13 10  4c 69 6e 75  78 20 73 74  72 6f 6e 67
|   53 77 61 6e  31 1b 30 19  06 03 55 04  03 13 12 73
|   74 72 6f 6e  67 53 77 61  6e 20 52 6f  6f 74 20 43
|   41 82 01 00  30 39 06 03  55 1d 1f 04  32 30 30 30
|   2e a0 2c a0  2a 86 28 68  74 74 70 3a  2f 2f 63 72
|   6c 2e 73 74  72 6f 6e 67  73 77 61 6e  2e 6f 72 67
|   2f 73 74 72  6f 6e 67 73  77 61 6e 2e  63 72 6c 30
|   0d 06 09 2a  86 48 86 f7  0d 01 01 0b  05 00 03 82
|   01 01 00 45  f6 46 81 d2  59 f0 db 03  85 63 42 c1
|   2f ab eb 90  b2 2c cd c2  79 b3 d7 e2  9c 61 8b cd
|   f3 f1 a3 6a  97 5b 0e 14  08 97 90 08  6a f0 9e c9
|   ab fa 71 f0  1a 8f b5 d6  0d c0 0a ff  e8 a3 6b 76
|   52 75 9c 17  2e 01 a2 e7  33 e7 51 db  14 30 d3 e8
|   d7 23 1c dd  32 5d 60 54  5c e8 a6 e5  94 4d e4 e6
|   ed 64 6f 57  d0 bf 61 33  01 55 8c 0e  9a e7 dc 68
|   46 cc 6e 57  56 66 36 8b  21 75 2d 17  0a d8 3e fe
|   6a 0a f1 31  2c 37 1f 59  00 57 83 40  7e 33 10 64
|   1a d4 8f 1d  ec 2c 79 fb  01 0f 6c 7c  2e 12 cc 9d
|   bc 75 d7 c3  dc 48 36 56  44 b0 ee 89  1f 95 19 16
|   c3 ba 8a 01  1a 4d 95 81  da d6 1f 01  d3 06 e3 d4
|   31 e6 7a 32  27 7a 45 b6  06 d1 7d c0  e5 fa 0e 15
|   19 48 c4 c1  d5 a7 18 3b  43 17 6c 08  6a 3c 8f 82
|   fc 11 d0 af  de 70 29 44  c2 da b7 84  16 68 33 26
|   8c 7d c0 4f  a3 79 0d e6  26 2c 23 4a  94 3f 81 48
|   86 34 ed
| emitting length of IKEv2 Certificate Payload: 1064
|  payload after AUTH will be ISAKMP_NEXT_v2SA
| *****emit IKEv2 Authentication Payload:
|    next payload type: ISAKMP_NEXT_v2SA
|    critical bit: none
|    auth method: v2_AUTH_RSA
| emitting 192 zero bytes of fake rsa sig into IKEv2 Authentication Payload
| emitting length of IKEv2 Authentication Payload: 200
| empty esp_info, returning defaults
| *****emit IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2TSi
|    critical bit: none
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_P
|    prop #: 1
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_P
|    prop #: 2
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_P
|    prop #: 3
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| ******emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    prop #: 4
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| emitting length of IKEv2 Security Association Payload: 156
| *****emit IKEv2 Traffic Selector Payload:
|    next payload type: ISAKMP_NEXT_v2TSr
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selector
| ipv4 low  5d b8 d8 23
| emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selector
| ipv4 high  5d b8 d8 23
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector Payload: 24
| *****emit IKEv2 Traffic Selector Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selector
| ipv4 low  0a 02 00 00
| emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selector
| ipv4 high  0a 02 ff ff
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector Payload: 24
| emitting 16 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 1648
| emitting length of ISAKMP Message: 1676
| data before encryption:
|   25 00 00 84  09 00 00 00  30 7a 31 0b  30 09 06 03
|   55 04 06 13  02 43 41 31  0b 30 09 06  03 55 04 08
|   0c 02 4f 4e  31 0f 30 0d  06 03 55 04  07 0c 06 4f
|   74 74 61 77  61 31 1e 30  1c 06 03 55  04 0a 0c 15
|   58 65 6c 65  72 61 6e 63  65 20 43 6f  72 70 6f 72
|   61 74 69 6f  6e 31 11 30  0f 06 03 55  04 0b 0c 08
|   4f 70 65 6e  73 77 61 6e  31 1a 30 18  06 03 55 04
|   03 0c 11 64  61 76 65 40  6f 70 65 6e  73 77 61 6e
|   2e 6f 72 67  27 00 04 28  04 30 82 04  1f 30 82 03
|   07 a0 03 02  01 02 02 01  33 30 0d 06  09 2a 86 48
|   86 f7 0d 01  01 0b 05 00  30 45 31 0b  30 09 06 03
|   55 04 06 13  02 43 48 31  19 30 17 06  03 55 04 0a
|   13 10 4c 69  6e 75 78 20  73 74 72 6f  6e 67 53 77
|   61 6e 31 1b  30 19 06 03  55 04 03 13  12 73 74 72
|   6f 6e 67 53  77 61 6e 20  52 6f 6f 74  20 43 41 30
|   1e 17 0d 31  35 30 37 33  30 31 38 33  36 31 35 5a
|   17 0d 31 38  30 35 31 39  31 38 33 36  31 35 5a 30
|   7a 31 0b 30  09 06 03 55  04 06 13 02  43 41 31 0b
|   30 09 06 03  55 04 08 0c  02 4f 4e 31  0f 30 0d 06
|   03 55 04 07  0c 06 4f 74  74 61 77 61  31 1e 30 1c
|   06 03 55 04  0a 0c 15 58  65 6c 65 72  61 6e 63 65
|   20 43 6f 72  70 6f 72 61  74 69 6f 6e  31 11 30 0f
|   06 03 55 04  0b 0c 08 4f  70 65 6e 73  77 61 6e 31
|   1a 30 18 06  03 55 04 03  0c 11 64 61  76 65 40 6f
|   70 65 6e 73  77 61 6e 2e  6f 72 67 30  82 01 22 30
|   0d 06 09 2a  86 48 86 f7  0d 01 01 01  05 00 03 82
|   01 0f 00 30  82 01 0a 02  82 01 01 00  e3 a8 4c c6
|   cc c7 e3 b7  7c e7 4f 15  4b 04 ca fa  cb 06 46 c0
|   dc 08 c1 c8  aa 5d 06 b7  7c 55 41 ab  cf a8 00 a9
|   f3 8a 50 da  a4 c4 2c 3e  45 e0 f3 b7  91 28 2f d3
|   b8 89 cf e2  c2 33 9a 9d  04 87 3c 9c  c3 cd 94 7f
|   51 70 3c 7f  da 9b 6d 5e  41 1d b3 6c  9e 84 76 c2
|   d4 97 21 fb  4b 86 9b 10  3b 43 74 42  94 2d e0 bd
|   2b d7 74 0e  70 99 3a c1  06 f2 b6 45  ab 0c cc 1e
|   bf 90 36 80  08 e0 d8 ed  10 c7 a6 e3  df 26 1d 95
|   73 db e6 f0  50 6c 17 b8  6e 77 fc 54  c9 21 1e af
|   1a 2b 4a 5d  d3 b0 7b 5d  c5 90 b8 01  14 10 85 bc
|   86 c2 5e 45  73 d8 e7 a6  47 60 5c ee  85 80 f4 49
|   b3 df e2 8d  50 b6 d5 ba  f8 79 09 53  55 01 31 57
|   16 ec bc e2  77 48 0f e2  c8 4c ed 69  a9 d8 f1 81
|   0e ea c3 3e  7d 24 c8 bf  75 05 88 2d  e7 ed c5 cb
|   29 ce ec ef  57 85 f9 f4  7f 37 c7 a7  b8 79 47 ff
|   ea 68 5c a8  73 dc 80 e7  b9 c7 ec 67  02 03 01 00
|   01 a3 81 e4  30 81 e1 30  09 06 03 55  1d 13 04 02
|   30 00 30 0b  06 03 55 1d  0f 04 04 03  02 03 a8 30
|   1d 06 03 55  1d 0e 04 16  04 14 c2 64  69 e8 dc 88
|   e3 23 58 47  07 86 4b 5e  d4 b3 ea bc  a7 10 30 6d
|   06 03 55 1d  23 04 66 30  64 80 14 5d  a7 dd 70 06
|   51 32 7e e7  b6 6d b3 b5  e5 e0 60 ea  2e 4d ef a1
|   49 a4 47 30  45 31 0b 30  09 06 03 55  04 06 13 02
|   43 48 31 19  30 17 06 03  55 04 0a 13  10 4c 69 6e
|   75 78 20 73  74 72 6f 6e  67 53 77 61  6e 31 1b 30
|   19 06 03 55  04 03 13 12  73 74 72 6f  6e 67 53 77
|   61 6e 20 52  6f 6f 74 20  43 41 82 01  00 30 39 06
|   03 55 1d 1f  04 32 30 30  30 2e a0 2c  a0 2a 86 28
|   68 74 74 70  3a 2f 2f 63  72 6c 2e 73  74 72 6f 6e
|   67 73 77 61  6e 2e 6f 72  67 2f 73 74  72 6f 6e 67
|   73 77 61 6e  2e 63 72 6c  30 0d 06 09  2a 86 48 86
|   f7 0d 01 01  0b 05 00 03  82 01 01 00  45 f6 46 81
|   d2 59 f0 db  03 85 63 42  c1 2f ab eb  90 b2 2c cd
|   c2 79 b3 d7  e2 9c 61 8b  cd f3 f1 a3  6a 97 5b 0e
|   14 08 97 90  08 6a f0 9e  c9 ab fa 71  f0 1a 8f b5
|   d6 0d c0 0a  ff e8 a3 6b  76 52 75 9c  17 2e 01 a2
|   e7 33 e7 51  db 14 30 d3  e8 d7 23 1c  dd 32 5d 60
|   54 5c e8 a6  e5 94 4d e4  e6 ed 64 6f  57 d0 bf 61
|   33 01 55 8c  0e 9a e7 dc  68 46 cc 6e  57 56 66 36
|   8b 21 75 2d  17 0a d8 3e  fe 6a 0a f1  31 2c 37 1f
|   59 00 57 83  40 7e 33 10  64 1a d4 8f  1d ec 2c 79
|   fb 01 0f 6c  7c 2e 12 cc  9d bc 75 d7  c3 dc 48 36
|   56 44 b0 ee  89 1f 95 19  16 c3 ba 8a  01 1a 4d 95
|   81 da d6 1f  01 d3 06 e3  d4 31 e6 7a  32 27 7a 45
|   b6 06 d1 7d  c0 e5 fa 0e  15 19 48 c4  c1 d5 a7 18
|   3b 43 17 6c  08 6a 3c 8f  82 fc 11 d0  af de 70 29
|   44 c2 da b7  84 16 68 33  26 8c 7d c0  4f a3 79 0d
|   e6 26 2c 23  4a 94 3f 81  48 86 34 ed  21 00 00 c8
|   01 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  2c 00 00 9c  02 00 00 28  01 03 04 03
|   12 34 56 78  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 02  00 00 00 08  05 00 00 00
|   02 00 00 28  02 03 04 03  12 34 56 78  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 01
|   00 00 00 08  05 00 00 00  02 00 00 24  03 03 04 03
|   12 34 56 78  03 00 00 08  01 00 00 03  03 00 00 08
|   03 00 00 02  00 00 00 08  05 00 00 00  00 00 00 24
|   04 03 04 03  12 34 56 78  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  00 00 00 08  05 00 00 00
|   2d 00 00 18  01 00 00 00  07 00 00 10  00 00 ff ff
|   5d b8 d8 23  5d b8 d8 23  00 00 00 18  01 00 00 00
|   07 00 00 10  00 00 ff ff  0a 02 00 00  0a 02 ff ff
|   00 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
| data after encryption:
|   a2 92 6c 8a  71 fd 52 2b  0b 8c b5 31  dd 5d 4f ca
|   6c 38 bf 35  76 e5 c8 ad  8d f0 02 20  a8 45 73 80
|   f7 a7 b6 f5  82 ed 1f 3e  01 99 90 cc  6f 26 93 86
|   0b 2e 30 70  1c af 34 56  14 05 2b b1  ab 49 3e 8f
|   f2 ad 73 39  ad e8 b0 be  62 cb 97 d3  f0 a2 77 a4
|   11 42 0b 3e  c7 d9 d2 30  4f 30 ed 7d  e2 86 69 ad
|   fb 33 b0 a8  24 82 f6 4c  7f 66 f6 d1  14 0a 07 65
|   9a 7a 00 97  34 5f db a6  18 fb 9a 25  db c5 c5 6f
|   20 5b a0 ab  ba d0 9f bb  97 8d bb c2  59 97 90 42
|   a4 9b 8f 7d  b9 4f 9f f3  dd ea cb f9  40 ed 2a c0
|   2e ee b3 19  b9 b5 aa 79  ba 39 da 2f  bc a4 80 a2
|   73 6a 21 a0  dc 71 be e5  0b df 88 88  2d 87 35 b4
|   95 5d 43 16  57 3d 77 08  90 c4 26 b0  da 4f f8 b1
|   da 3f 91 d0  7a 7d b0 f5  e9 82 93 e1  c0 14 87 8d
|   f0 18 07 18  9b 7d 00 c3  e4 a3 e0 16  af 12 a4 c4
|   60 7b 2d 8d  4e 00 13 b8  88 60 77 71  98 89 34 5e
|   ca 85 e4 cf  97 e0 5a 47  23 51 3c d7  06 e4 08 c1
|   6f 36 76 ae  65 b8 6e bc  bd 39 b8 b5  6c ab 64 e5
|   50 c9 81 44  3c 38 ea b4  63 41 70 ed  f3 a0 df 43
|   12 f1 dc c3  92 64 89 fc  ad 5d 98 6e  26 10 58 ad
|   25 83 1e 8e  df ad c5 26  15 f9 b4 2f  06 55 75 c5
|   1a 27 45 4d  58 4d c4 c1  f7 71 ef 48  17 89 a3 e7
|   ed ca ff bf  2c 45 bf 48  30 e2 a1 4d  7d 78 b5 a3
|   76 55 bf 9f  3f 9c 7f c2  77 02 05 d5  65 ed f9 1b
|   bc 2d 8f d5  cb c2 29 e2  a3 99 89 31  5d de 9b 85
|   a9 38 d0 dd  f0 17 2e 41  e4 88 df d9  69 09 59 3f
|   73 b6 4e e8  90 12 f2 33  c1 0f e0 3d  54 71 c2 f5
|   c3 20 97 00  78 39 b1 1f  6d a1 f2 a8  ce 67 c3 32
|   c8 21 11 20  37 71 ed 2a  e3 22 3e 9d  63 a0 2f f7
|   29 3c 1c ff  79 a5 90 50  91 6c 2d b6  d2 70 e8 ac
|   71 5b 23 43  23 78 81 9b  c3 98 1f 6b  fb fa 63 41
|   d7 1f c0 34  69 1b 30 63  03 d9 bc 3b  8b 2f 7d 8a
|   09 d2 2b 1b  c3 79 14 5d  67 7c 16 7c  bc b7 e2 0c
|   d5 5a 62 8d  7f 45 bc 48  fa 88 19 c7  1c bc ab 22
|   01 2d 14 b2  04 5e 55 93  a2 de 0f 7f  f4 aa ff ab
|   00 39 1d ca  28 45 aa 5e  28 ca 25 ce  f9 44 8d da
|   41 b3 39 2a  64 e4 c7 6e  51 c6 77 dc  71 21 5d bd
|   b7 a7 31 49  0d 9f 85 cc  a0 a4 61 a1  da 55 26 d3
|   f5 97 2e d0  24 c1 f0 96  72 3d c7 32  aa 3b 91 39
|   8d df ae c3  9f 13 ca 6b  3c 66 8c ca  76 90 02 40
|   84 e0 e7 3e  51 8e e0 62  4e 49 d9 21  8e 1e 03 13
|   ec f3 15 87  fe e6 29 6d  3f ea 6d 39  f6 13 3f 03
|   28 31 74 cf  95 18 b2 5f  7d b6 dd a3  96 1f 82 e4
|   f3 46 f9 12  22 dc 41 73  04 ed 44 21  10 b2 f2 25
|   20 b2 ac 73  24 f9 88 d9  55 c2 5e 30  73 54 e1 d8
|   b9 7e 6b 38  cd d0 8e 0b  1f cd bf 7e  2b e1 2a 7d
|   55 0d 3f 7e  b2 5f 9f 68  e7 97 12 1a  43 0f ac ce
|   fd a1 07 75  30 35 ff bd  6a f1 f0 b9  d3 51 bd ad
|   9f d0 38 ef  d8 c8 7e 60  de 3f f7 10  5e 55 0a f3
|   f3 77 78 f8  18 a1 08 cc  d7 17 f6 e9  fd c0 e4 cb
|   f8 82 b1 d9  29 cc 33 76  ea 2e e9 3e  9f 20 50 43
|   51 e5 13 bc  1b 62 94 e5  cc 66 28 f5  95 75 de 03
|   b9 b5 24 e1  ee 13 81 a0  54 e3 86 39  97 42 32 17
|   01 f3 64 98  9a 91 61 1c  46 63 16 af  bd 61 29 8f
|   97 be a5 dc  d0 18 10 0d  69 25 88 46  c1 e4 1f 63
|   60 d7 c3 ba  79 47 d0 7e  44 49 3e 00  76 43 33 fa
|   ea 3f 18 1e  71 19 2a b5  ac b0 39 d9  0d 92 53 16
|   ba e9 6f 32  fd f5 7c 38  0a da b2 11  59 11 ff f8
|   a5 a6 ea f8  26 2b 2a 72  9d 9d 9b 6c  6f 61 c0 a2
|   d3 a0 33 1f  28 6c 54 78  b2 d9 99 77  18 fd e7 d6
|   73 3e 1a d1  80 d9 38 f5  a2 20 c4 84  e7 98 75 d0
|   16 9c 3a c7  f5 d1 b1 4b  c9 89 72 9c  7b 7c d0 cb
|   2f b5 1e 65  7b 7b 4d f7  5e fb 61 2c  1a d7 79 ab
|   de a0 bd 5b  89 15 10 55  d9 e5 cb 0d  c6 1c 6c 30
|   71 61 99 68  bf b5 57 f7  8c ef 55 dd  67 fa e5 62
|   d9 ca 84 d0  12 82 76 b9  8a 7e c7 a9  9a 93 58 89
|   19 1d 80 59  76 51 7c 88  07 4d ad e2  f2 ee 4f 9d
|   42 ee 6e d1  91 b1 cd 50  2e f3 7e 03  32 0d f9 e7
|   60 06 07 f6  0e ae 6d 27  10 f0 6a 97  66 78 de ef
|   46 f5 51 0a  f3 57 83 1b  60 74 75 a8  9b f6 73 57
|   66 e1 32 45  5d 22 c1 0f  0d 4f e5 e3  77 65 23 e7
|   68 a9 db 0b  10 08 b6 25  de d7 cc c6  20 f4 ce 79
|   bd 5e a7 ee  1b db bd 29  44 0b 5d 22  7b 2e 20 e1
|   0a 5a de 91  6f dd af 02  7b 2c 9d 5d  72 39 06 47
|   c5 c3 37 dd  b9 f5 6b e2  cf fe 6f 15  eb 95 03 31
|   03 6e b6 19  f1 dd fb 8f  ac 2c a3 16  fd 60 c1 f2
|   ec 6b ef ad  61 c0 49 1d  16 27 49 7a  e7 ce 8f 9e
|   ed db 24 20  75 37 36 e1  38 25 a0 b7  ec ab 0d 4a
|   bc 28 73 6a  6e 0a 9c 88  f5 06 60 0a  91 a0 ea 5d
|   18 fd ba d0  2a c4 de 05  92 a1 19 ec  68 fd c7 42
|   32 78 b5 cf  31 4b 4e 9f  48 cb 8b 9a  59 63 fe 9d
|   7b e1 0d 62  66 58 2d a5  3a 0a 22 20  46 fe ed 66
|   a1 2e e8 bc  a2 83 bd 9e  a3 86 27 4e  3d c5 20 70
|   c4 00 b6 fc  0d 31 cb e9  97 48 d0 59  66 a5 8f 50
|   5a 4d 7c af  b2 8c 9e 3d  b4 f2 b0 58  00 a7 53 81
|   32 f4 03 0c  6e 3d c3 67  32 59 db b6  37 25 7e 8c
|   4a 08 52 8d  fd 12 d4 13  89 a8 bc a0  28 88 9c 0e
|   3d 74 24 bf  eb 8c fe 55  f6 37 58 17  58 4e 67 d4
|   d5 94 b5 7d  4f c8 e1 11  9b 68 00 da  76 65 da c3
|   e7 d6 d0 2a  a7 c3 1d 71  c7 da 47 b7  77 5f 2f 6b
|   f2 9b 54 1f  07 56 33 64  77 57 64 aa  66 2b ab 96
|   60 31 8d df  d5 9a 01 41  e5 d8 54 b6  f5 67 a1 fc
|   84 cc db 66  6f a5 ef 57  3f ba d3 a7  07 38 b5 02
|   51 13 17 4a  eb d9 0c 97  48 56 b5 0f  83 65 43 2a
|   0f 61 82 90  a9 a8 f2 1d  af f7 1b 3d  c9 25 2d 53
|   af ab c3 57  83 4d 4e 42  bc f8 eb 0d  69 4b 26 de
|   3f cf 02 12  d3 19 d5 9e  f3 31 e4 3e  96 b0 f0 e9
|   2e 71 1f fb  2a db a0 f8  31 00 ed 83  97 c1 05 5f
|   fd ad 0d fd  7b 65 30 46  9a df 0a fa  23 ac b2 ed
|   7d 6e 1e 01  90 2b 97 1d  79 da 17 7e  7d ed d3 61
|   1a 20 0d 4a  ca 7b 68 25  cb 16 12 06  8d 77 01 c5
| complete v2 state transition with STF_OK
./davecertI2 transition from state STATE_PARENT_I1 to state STATE_PARENT_I2
./davecertI2 STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=aes_128 integ=sha1_96 prf=oakley_sha group=modp2048} (msgid: 00000001)
| sending reply packet to 132.213.238.7:500 (from port 500)
sending 1676 bytes for STATE_PARENT_I1 through eth0:500 to 132.213.238.7:500 (using #2)
|   8d 0e 0f 10  11 12 13 14  5d 73 ce 75  3d b1 db 6d
|   2e 20 23 08  00 00 00 01  00 00 06 8c  23 00 06 70
|   8d 0e 0f 10  11 12 13 14  15 16 17 18  19 1a 1b 1c
|   a2 92 6c 8a  71 fd 52 2b  0b 8c b5 31  dd 5d 4f ca
|   6c 38 bf 35  76 e5 c8 ad  8d f0 02 20  a8 45 73 80
|   f7 a7 b6 f5  82 ed 1f 3e  01 99 90 cc  6f 26 93 86
|   0b 2e 30 70  1c af 34 56  14 05 2b b1  ab 49 3e 8f
|   f2 ad 73 39  ad e8 b0 be  62 cb 97 d3  f0 a2 77 a4
|   11 42 0b 3e  c7 d9 d2 30  4f 30 ed 7d  e2 86 69 ad
|   fb 33 b0 a8  24 82 f6 4c  7f 66 f6 d1  14 0a 07 65
|   9a 7a 00 97  34 5f db a6  18 fb 9a 25  db c5 c5 6f
|   20 5b a0 ab  ba d0 9f bb  97 8d bb c2  59 97 90 42
|   a4 9b 8f 7d  b9 4f 9f f3  dd ea cb f9  40 ed 2a c0
|   2e ee b3 19  b9 b5 aa 79  ba 39 da 2f  bc a4 80 a2
|   73 6a 21 a0  dc 71 be e5  0b df 88 88  2d 87 35 b4
|   95 5d 43 16  57 3d 77 08  90 c4 26 b0  da 4f f8 b1
|   da 3f 91 d0  7a 7d b0 f5  e9 82 93 e1  c0 14 87 8d
|   f0 18 07 18  9b 7d 00 c3  e4 a3 e0 16  af 12 a4 c4
|   60 7b 2d 8d  4e 00 13 b8  88 60 77 71  98 89 34 5e
|   ca 85 e4 cf  97 e0 5a 47  23 51 3c d7  06 e4 08 c1
|   6f 36 76 ae  65 b8 6e bc  bd 39 b8 b5  6c ab 64 e5
|   50 c9 81 44  3c 38 ea b4  63 41 70 ed  f3 a0 df 43
|   12 f1 dc c3  92 64 89 fc  ad 5d 98 6e  26 10 58 ad
|   25 83 1e 8e  df ad c5 26  15 f9 b4 2f  06 55 75 c5
|   1a 27 45 4d  58 4d c4 c1  f7 71 ef 48  17 89 a3 e7
|   ed ca ff bf  2c 45 bf 48  30 e2 a1 4d  7d 78 b5 a3
|   76 55 bf 9f  3f 9c 7f c2  77 02 05 d5  65 ed f9 1b
|   bc 2d 8f d5  cb c2 29 e2  a3 99 89 31  5d de 9b 85
|   a9 38 d0 dd  f0 17 2e 41  e4 88 df d9  69 09 59 3f
|   73 b6 4e e8  90 12 f2 33  c1 0f e0 3d  54 71 c2 f5
|   c3 20 97 00  78 39 b1 1f  6d a1 f2 a8  ce 67 c3 32
|   c8 21 11 20  37 71 ed 2a  e3 22 3e 9d  63 a0 2f f7
|   29 3c 1c ff  79 a5 90 50  91 6c 2d b6  d2 70 e8 ac
|   71 5b 23 43  23 78 81 9b  c3 98 1f 6b  fb fa 63 41
|   d7 1f c0 34  69 1b 30 63  03 d9 bc 3b  8b 2f 7d 8a
|   09 d2 2b 1b  c3 79 14 5d  67 7c 16 7c  bc b7 e2 0c
|   d5 5a 62 8d  7f 45 bc 48  fa 88 19 c7  1c bc ab 22
|   01 2d 14 b2  04 5e 55 93  a2 de 0f 7f  f4 aa ff ab
|   00 39 1d ca  28 45 aa 5e  28 ca 25 ce  f9 44 8d da
|   41 b3 39 2a  64 e4 c7 6e  51 c6 77 dc  71 21 5d bd
|   b7 a7 31 49  0d 9f 85 cc  a0 a4 61 a1  da 55 26 d3
|   f5 97 2e d0  24 c1 f0 96  72 3d c7 32  aa 3b 91 39
|   8d df ae c3  9f 13 ca 6b  3c 66 8c ca  76 90 02 40
|   84 e0 e7 3e  51 8e e0 62  4e 49 d9 21  8e 1e 03 13
|   ec f3 15 87  fe e6 29 6d  3f ea 6d 39  f6 13 3f 03
|   28 31 74 cf  95 18 b2 5f  7d b6 dd a3  96 1f 82 e4
|   f3 46 f9 12  22 dc 41 73  04 ed 44 21  10 b2 f2 25
|   20 b2 ac 73  24 f9 88 d9  55 c2 5e 30  73 54 e1 d8
|   b9 7e 6b 38  cd d0 8e 0b  1f cd bf 7e  2b e1 2a 7d
|   55 0d 3f 7e  b2 5f 9f 68  e7 97 12 1a  43 0f ac ce
|   fd a1 07 75  30 35 ff bd  6a f1 f0 b9  d3 51 bd ad
|   9f d0 38 ef  d8 c8 7e 60  de 3f f7 10  5e 55 0a f3
|   f3 77 78 f8  18 a1 08 cc  d7 17 f6 e9  fd c0 e4 cb
|   f8 82 b1 d9  29 cc 33 76  ea 2e e9 3e  9f 20 50 43
|   51 e5 13 bc  1b 62 94 e5  cc 66 28 f5  95 75 de 03
|   b9 b5 24 e1  ee 13 81 a0  54 e3 86 39  97 42 32 17
|   01 f3 64 98  9a 91 61 1c  46 63 16 af  bd 61 29 8f
|   97 be a5 dc  d0 18 10 0d  69 25 88 46  c1 e4 1f 63
|   60 d7 c3 ba  79 47 d0 7e  44 49 3e 00  76 43 33 fa
|   ea 3f 18 1e  71 19 2a b5  ac b0 39 d9  0d 92 53 16
|   ba e9 6f 32  fd f5 7c 38  0a da b2 11  59 11 ff f8
|   a5 a6 ea f8  26 2b 2a 72  9d 9d 9b 6c  6f 61 c0 a2
|   d3 a0 33 1f  28 6c 54 78  b2 d9 99 77  18 fd e7 d6
|   73 3e 1a d1  80 d9 38 f5  a2 20 c4 84  e7 98 75 d0
|   16 9c 3a c7  f5 d1 b1 4b  c9 89 72 9c  7b 7c d0 cb
|   2f b5 1e 65  7b 7b 4d f7  5e fb 61 2c  1a d7 79 ab
|   de a0 bd 5b  89 15 10 55  d9 e5 cb 0d  c6 1c 6c 30
|   71 61 99 68  bf b5 57 f7  8c ef 55 dd  67 fa e5 62
|   d9 ca 84 d0  12 82 76 b9  8a 7e c7 a9  9a 93 58 89
|   19 1d 80 59  76 51 7c 88  07 4d ad e2  f2 ee 4f 9d
|   42 ee 6e d1  91 b1 cd 50  2e f3 7e 03  32 0d f9 e7
|   60 06 07 f6  0e ae 6d 27  10 f0 6a 97  66 78 de ef
|   46 f5 51 0a  f3 57 83 1b  60 74 75 a8  9b f6 73 57
|   66 e1 32 45  5d 22 c1 0f  0d 4f e5 e3  77 65 23 e7
|   68 a9 db 0b  10 08 b6 25  de d7 cc c6  20 f4 ce 79
|   bd 5e a7 ee  1b db bd 29  44 0b 5d 22  7b 2e 20 e1
|   0a 5a de 91  6f dd af 02  7b 2c 9d 5d  72 39 06 47
|   c5 c3 37 dd  b9 f5 6b e2  cf fe 6f 15  eb 95 03 31
|   03 6e b6 19  f1 dd fb 8f  ac 2c a3 16  fd 60 c1 f2
|   ec 6b ef ad  61 c0 49 1d  16 27 49 7a  e7 ce 8f 9e
|   ed db 24 20  75 37 36 e1  38 25 a0 b7  ec ab 0d 4a
|   bc 28 73 6a  6e 0a 9c 88  f5 06 60 0a  91 a0 ea 5d
|   18 fd ba d0  2a c4 de 05  92 a1 19 ec  68 fd c7 42
|   32 78 b5 cf  31 4b 4e 9f  48 cb 8b 9a  59 63 fe 9d
|   7b e1 0d 62  66 58 2d a5  3a 0a 22 20  46 fe ed 66
|   a1 2e e8 bc  a2 83 bd 9e  a3 86 27 4e  3d c5 20 70
|   c4 00 b6 fc  0d 31 cb e9  97 48 d0 59  66 a5 8f 50
|   5a 4d 7c af  b2 8c 9e 3d  b4 f2 b0 58  00 a7 53 81
|   32 f4 03 0c  6e 3d c3 67  32 59 db b6  37 25 7e 8c
|   4a 08 52 8d  fd 12 d4 13  89 a8 bc a0  28 88 9c 0e
|   3d 74 24 bf  eb 8c fe 55  f6 37 58 17  58 4e 67 d4
|   d5 94 b5 7d  4f c8 e1 11  9b 68 00 da  76 65 da c3
|   e7 d6 d0 2a  a7 c3 1d 71  c7 da 47 b7  77 5f 2f 6b
|   f2 9b 54 1f  07 56 33 64  77 57 64 aa  66 2b ab 96
|   60 31 8d df  d5 9a 01 41  e5 d8 54 b6  f5 67 a1 fc
|   84 cc db 66  6f a5 ef 57  3f ba d3 a7  07 38 b5 02
|   51 13 17 4a  eb d9 0c 97  48 56 b5 0f  83 65 43 2a
|   0f 61 82 90  a9 a8 f2 1d  af f7 1b 3d  c9 25 2d 53
|   af ab c3 57  83 4d 4e 42  bc f8 eb 0d  69 4b 26 de
|   3f cf 02 12  d3 19 d5 9e  f3 31 e4 3e  96 b0 f0 e9
|   2e 71 1f fb  2a db a0 f8  31 00 ed 83  97 c1 05 5f
|   fd ad 0d fd  7b 65 30 46  9a df 0a fa  23 ac b2 ed
|   7d 6e 1e 01  90 2b 97 1d  79 da 17 7e  7d ed d3 61
|   1a 20 0d 4a  ca 7b 68 25  cb 16 12 06  8d 77 01 c5
|   09 9d 66 67  fa a3 5a 21  d3 b2 2c 18
./davecertI2 deleting connection
| pass 0: considering CHILD SAs to delete
./davecertI2 deleting state #2 (STATE_PARENT_I2)
| received request to delete child state
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  5d 73 ce 75  3d b1 db 6d
| state hash entry 15
./davecertI2 deleting state #1 (STATE_PARENT_I2)
| considering request to delete IKE parent state
| sending IKE SA delete request
| **emit ISAKMP Message:
|    initiator cookie:
|   8d 0e 0f 10  11 12 13 14
|    responder cookie:
|   5d 73 ce 75  3d b1 db 6d
|    next payload type: ISAKMP_NEXT_v2E
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_INFORMATIONAL
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 02
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2D
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
| *****emit IKEv2 Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    critical bit: none
|    protocol ID: 1
|    SPI size: 0
|    number of SPIs: 0
| emitting length of IKEv2 Delete Payload: 8
| emitting 8 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 48
| emitting length of ISAKMP Message: 76
| data before encryption:
|   00 00 00 08  01 00 00 00  00 01 02 03  04 05 06 07
| data after encryption:
|   ef 61 43 7e  20 c8 ff cc  28 2e 1d 57  52 43 96 41
sending 76 bytes for ikev2_delete_out through eth0:500 to 132.213.238.7:500 (using #1)
|   8d 0e 0f 10  11 12 13 14  5d 73 ce 75  3d b1 db 6d
|   2e 20 25 08  00 00 00 02  00 00 00 4c  2a 00 00 30
|   8d 0e 0f 10  11 12 13 14  15 16 17 18  19 1a 1b 1c
|   ef 61 43 7e  20 c8 ff cc  28 2e 1d 57  52 43 96 41
|   6a 62 0f cc  8a 03 02 70  19 cd 9e e2
| pass 1: considering PARENT SAs to delete
./davecertI2 deleting state #1 (STATE_IKESA_DEL)
| considering request to delete IKE parent state
| now deleting the IKE (or parent) state
| ICOOKIE:  8d 0e 0f 10  11 12 13 14
| RCOOKIE:  5d 73 ce 75  3d b1 db 6d
| state hash entry 15
./davecertI2 leak: request packet for informational exchange, item size: X
./davecertI2 leak: reply packet, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_prop, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: 4 * sa copy attrs array, item size: X
./davecertI2 leak: sa copy trans array, item size: X
./davecertI2 leak: sa copy prop array, item size: X
./davecertI2 leak: sa copy prop conj array, item size: X
./davecertI2 leak: sa copy prop_conj, item size: X
./davecertI2 leak: saved first received packet, item size: X
./davecertI2 leak: st_nr in duplicate_state, item size: X
./davecertI2 leak: st_ni in duplicate_state, item size: X
./davecertI2 leak: st_skey_pr in duplicate_state, item size: X
./davecertI2 leak: st_skey_pi in duplicate_state, item size: X
./davecertI2 leak: st_skey_er in duplicate_state, item size: X
./davecertI2 leak: st_skey_ei in duplicate_state, item size: X
./davecertI2 leak: st_skey_ar in duplicate_state, item size: X
./davecertI2 leak: st_skey_ai in duplicate_state, item size: X
./davecertI2 leak: st_skey_d in duplicate_state, item size: X
./davecertI2 leak: st_skeyseed in duplicate_state, item size: X
./davecertI2 leak: st_enc_key in duplicate_state, item size: X
./davecertI2 leak: struct state in new_state(), item size: X
./davecertI2 leak: calculated skey_prshared secret, item size: X
./davecertI2 leak: calculated skey_pishared secret, item size: X
./davecertI2 leak: calculated skey_ershared secret, item size: X
./davecertI2 leak: calculated skey_eishared secret, item size: X
./davecertI2 leak: calculated skey_arshared secret, item size: X
./davecertI2 leak: calculated skey_aishared secret, item size: X
./davecertI2 leak: calculated skey_dshared secret, item size: X
./davecertI2 leak: calculated sharedshared secret, item size: X
./davecertI2 leak: ikev2_inR1outI2 KE, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_prop, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: nonce, item size: X
./davecertI2 leak: Gr, item size: X
./davecertI2 leak: saved first packet, item size: X
./davecertI2 leak: sa in main_outI1, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_prop, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: initiator nonce, item size: X
./davecertI2 leak: long term secret, item size: X
./davecertI2 leak: saved gi value, item size: X
./davecertI2 leak: msg_digest, item size: X
./davecertI2 leak: ikev2_outI1 KE, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_prop, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: db_attrs, item size: X
./davecertI2 leak: db_v2_trans, item size: X
./davecertI2 leak: db_v2_prop_conj, item size: X
./davecertI2 leak: 12 * sa copy attrs array, item size: X
./davecertI2 leak: sa copy trans array, item size: X
./davecertI2 leak: sa copy prop array, item size: X
./davecertI2 leak: sa copy prop conj array, item size: X
./davecertI2 leak: sa copy prop_conj, item size: X
./davecertI2 leak: struct state in new_state(), item size: X
./davecertI2 leak: x509cert, item size: X
./davecertI2 leak: CA cert, item size: X
./davecertI2 leak: issuer dn, item size: X
./davecertI2 leak: keep id name, item size: X
./davecertI2 leak: pubkey entry, item size: X
./davecertI2 leak: pubkey, item size: X
./davecertI2 leak: certificate filename, item size: X
./davecertI2 leak: 2 * id list, item size: X
./davecertI2 leak: secret, item size: X
./davecertI2 leak: policies path, item size: X
./davecertI2 leak: ocspcerts path, item size: X
./davecertI2 leak: aacerts path, item size: X
./davecertI2 leak: certs path, item size: X
./davecertI2 leak: private path, item size: X
./davecertI2 leak: crls path, item size: X
./davecertI2 leak: cacert path, item size: X
./davecertI2 leak: acert path, item size: X
./davecertI2 leak: override ipsec.d, item size: X
./davecertI2 leak: 2 * hasher name, item size: X
./davecertI2 leak: policies path, item size: X
./davecertI2 leak: ocspcerts path, item size: X
./davecertI2 leak: aacerts path, item size: X
./davecertI2 leak: certs path, item size: X
./davecertI2 leak: private path, item size: X
./davecertI2 leak: crls path, item size: X
./davecertI2 leak: cacert path, item size: X
./davecertI2 leak: acert path, item size: X
./davecertI2 leak: default conf var_dir, item size: X
./davecertI2 leak: default conf conffile, item size: X
./davecertI2 leak: default conf ipsecd_dir, item size: X
./davecertI2 leak: default conf ipsec_conf_dir, item size: X
./davecertI2 leak detective found Z leaks, total size X
