./IDhostpair loading secrets from "../samples/parker.secrets"
./IDhostpair loaded private key for keyid: PPK_RSA:AQN7wUerV
| processing whack message of size: A
| processing whack message of size: A
processing whack msg time: X size: Y
| processing whack message of size: A
processing whack msg time: X size: Y
| processing whack message of size: A
processing whack msg time: X size: Y
| find_host_pair: looking for me=<none>:500 %any him=<none>:500 any-match
| find_host_pair: concluded with <none>
| found_host_pair_conn (check_connection_end): %any:500 %any/%any:500 -> hp:none
| Added new connection mytunnel with policy RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+SAREFTRACK
| counting wild cards for @openswan.testing.xelerance.com is 0
| counting wild cards for @dnsh2h2 is 0
| orient mytunnel checking against if: eth0 (AF_INET:192.168.1.1:500)
|     orient matched on IP
| orient mytunnel checking against if: eth0 (AF_INET:1.1.168.192:4500)
| orient mytunnel checking against if: eth0 (AF_INET6:2606:2800:220:1:248:1893:25c8:1946:500)
|   orient mytunnel finished with: 1 [192.168.1.1]
| find_host_pair: looking for me=192.168.1.1:500 %any him=0.0.0.0:500 exact-match
| find_host_pair: concluded with <none>
| connect_to_host_pair: 192.168.1.1:500 %any 0.0.0.0:500 -> hp:none
| find_ID_host_pair: looking for me=@openswan.testing.xelerance.com him=@dnsh2h2 (exact)
|   concluded with <none>
./IDhostpair adding connection: "mytunnel"
| 192.168.1.1[@openswan.testing.xelerance.com]---192.139.46.65...%any[@dnsh2h2]
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+SAREFTRACK
| processing whack message of size: A
processing whack msg time: X size: Y
| processing whack message of size: A
processing whack msg time: X size: Y
| processing whack message of size: A
processing whack msg time: X size: Y
| find_host_pair: looking for me=<none>:500 %any him=<none>:500 any-match
| find_host_pair: comparing to me=192.168.1.1:500 %any him=0.0.0.0:500
| find_host_pair: concluded with mytunnel
| found_host_pair_conn (check_connection_end): %any:500 %any/%any:500 -> hp:mytunnel
| Added new connection mytunnel2 with policy RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+SAREFTRACK
| counting wild cards for @openswan.testing.xelerance.com is 0
| counting wild cards for @oswclient2 is 0
| orient mytunnel2 checking against if: eth0 (AF_INET:192.168.1.1:500)
|     orient matched on IP
| orient mytunnel2 checking against if: eth0 (AF_INET:1.1.168.192:4500)
| orient mytunnel2 checking against if: eth0 (AF_INET6:2606:2800:220:1:248:1893:25c8:1946:500)
|   orient mytunnel2 finished with: 1 [192.168.1.1]
| find_host_pair: looking for me=192.168.1.1:500 %any him=0.0.0.0:500 exact-match
| find_host_pair: comparing to me=192.168.1.1:500 %any him=0.0.0.0:500
| find_host_pair: concluded with mytunnel
| connect_to_host_pair: 192.168.1.1:500 %any 0.0.0.0:500 -> hp:mytunnel
| find_ID_host_pair: looking for me=@openswan.testing.xelerance.com him=@oswclient2 (exact)
|                   comparing to me=@openswan.testing.xelerance.com him=@dnsh2h2 (mytunnel)
|   concluded with <none>
./IDhostpair adding connection: "mytunnel2"
| 192.168.1.1[@openswan.testing.xelerance.com]---192.139.46.65...%any[@oswclient2]
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+SAREFTRACK
RC=2 IP hostpairs:
RC=2   IPpair: 192.168.1.1:500 - 0.0.0.0:500
RC=2      mytunnel2
RC=2      mytunnel
RC=2 ID hostpairs:
RC=2   IDpair: @openswan.testing.xelerance.com/         @oswclient2
RC=2      mytunnel2
RC=2   IDpair: @openswan.testing.xelerance.com/            @dnsh2h2
RC=2      mytunnel
./IDhostpair leak: 2 * keep id name, item size: X
./IDhostpair leak: ID host_pair, item size: X
./IDhostpair leak: keep id name, item size: X
./IDhostpair leak: host ip, item size: X
./IDhostpair leak: keep id name, item size: X
./IDhostpair leak: connection name, item size: X
./IDhostpair leak: struct connection, item size: X
./IDhostpair leak: 2 * keep id name, item size: X
./IDhostpair leak: ID host_pair, item size: X
./IDhostpair leak: host_pair, item size: X
./IDhostpair leak: keep id name, item size: X
./IDhostpair leak: host ip, item size: X
./IDhostpair leak: keep id name, item size: X
./IDhostpair leak: connection name, item size: X
./IDhostpair leak: struct connection, item size: X
./IDhostpair leak: policies path, item size: X
./IDhostpair leak: ocspcerts path, item size: X
./IDhostpair leak: aacerts path, item size: X
./IDhostpair leak: certs path, item size: X
./IDhostpair leak: private path, item size: X
./IDhostpair leak: crls path, item size: X
./IDhostpair leak: cacert path, item size: X
./IDhostpair leak: acert path, item size: X
./IDhostpair leak: default conf var_dir, item size: X
./IDhostpair leak: default conf conffile, item size: X
./IDhostpair leak: default conf ipsecd_dir, item size: X
./IDhostpair leak: default conf ipsec_conf_dir, item size: X
./IDhostpair leak: 2 * id list, item size: X
./IDhostpair leak: secret, item size: X
./IDhostpair leak detective found Z leaks, total size X
Pre-amble (offset: X): #!-pluto-whack-file- recorded on FOO
