strongswan
strongswan copied to clipboard
charon crashes due to SIGBUS error//strongswan version 5.9.13
Could you please check why charon crashes due to SIGBUS error.
Backtrace:
(gdb) bt full
#0 strnlen () at ../sysdeps/aarch64/strnlen.S:56
No locals.
#1 0x0000007fa3a1258c in printf_positional (s=s@entry=0x7fc323ac50, format=format@entry=0x7fa2cd26ba " loaded private key from %.*s", readonly_format=<optimized out>,
ap=<error reading variable: Cannot access memory at address 0x1>, ap_savep=ap_savep@entry=0x7fc323a7b8, done=done@entry=26, nspecs_done=nspecs_done@entry=0,
lead_str_end=lead_str_end@entry=0x7fa2cd26d4 "%.*s", work_buffer=<optimized out>, save_errno=<optimized out>, grouping=<optimized out>, thousands_sep=<optimized out>, mode_flags=<optimized out>)
at vfprintf-internal.c:1927
len = <optimized out>
function_done = <optimized out>
ptrptr = <optimized out>
signed_number = <optimized out>
is_negative = <optimized out>
alt = <optimized out>
space = <optimized out>
is_long_double = <optimized out>
showsign = <optimized out>
workend = <optimized out>
step4_jumps = {0 <repeats 14 times>, 2304, 2256, 2380, 2368, 2196, 1040, 1448, 1976, 1908, 1852, 1568, 1268, 1044, 0, 0, 0, 2032}
string = <optimized out>
width = 0
use_outdigits = <optimized out>
pad = <optimized out>
group = <optimized out>
is_short = <optimized out>
is_char = <optimized out>
is_long = <optimized out>
number = <optimized out>
base = <optimized out>
left = 0
prec = <optimized out>
spec = 115 's'
specsbuf = {data = 0x7fc3239e10, length = 1024, __space = {__align = {__max_align_ll = 39, __max_align_ld = 0},
__c = "'\000\000\000\000\000\000\000s\000\000\000\000\000\000\000 \000\000\000\177\000\000\000\330&͢\177\000\000\000\330&͢\177\000\000\000\000\000\000\000\377\377\377\377\001\000\000\000\003\000\000\000\001\000\000\000\000\000\000\000\377\377\377\377\177\000\000\000\214;\240\243\177\000\000\000\000 \265\243\177\000\000\000\240\204*xU\000\000\000\000\240\264\243\177\000\000\000#\271\277\243\177\000\000\000\002\000\000\000\000\000\000\000 \000\000\000\000\000\000\000`\260Σ\177\000\000\000\036\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000 \246#\303\177\000\000\000XZ\277\243\320\377\377\377\000\000\000\000\200\377\377\377\230\240#\303\177\000\000\000\002\000\000\000\377\377\377\377\000\000\000\000\000\000\000\000`\032\260"...}}
specs = <optimized out>
specs_limit = <optimized out>
argsbuf = {data = 0x7fc323a220, length = 1024, __space = {__align = {__max_align_ll = 545460846631, __max_align_ld = 0},
__c = "'\000\000\000\177\000\000\000P\231)xU\000\000\000\024pΣ\177\000\000\000P\251#\303\177\000\000\000\000\000\000\000\377\377\377\377\000\000\000\000\003", '\000' <repeats 11 times>, "\320\v\000\000\000\000\000\000\324&͢\177\000\000\000趴\243\177\000\000\000\260\263#\303\177\000\000\000\002\000\000\000\177\000\000\000\066Պ\243\177\000\000\000\000\000\000\000\200\377\377\377`\260Σ\177\000\000\000\377\377\377\377\377\377\377\377P\257#\303\177\000\000\000 \257#\303\177\000\000\000 \000\000\000\000\000\000\000\002\000\000\000\000\000\000\000\300\243#\303\177\000\000\000d\006\246\243\177\000\000\000\353\177\061xU", '\000' <repeats 11 times>, "\f", '\000' <repeats 15 times>...}}
nspecs = <optimized out>
nargs = <optimized out>
max_ref_arg = 0
cnt = <optimized out>
args_value = 0x7fc323a220
args_size = <optimized out>
args_type = <optimized out>
__PRETTY_FUNCTION__ = "printf_positional"
do_longlong_number = <optimized out>
#2 0x0000007fa3a14c64 in __vfprintf_internal (s=s@entry=0x7fc323ac50, format=format@entry=0x7fa2cd26ba " loaded private key from %.*s", ap=..., mode_flags=mode_flags@entry=2)
at vfprintf-internal.c:1602
_cleanup_start_doit = <optimized out>
--Type <RET> for more, q to quit, c to continue without paging--
_buffer = {__routine = 0x528de74a9677c200, __arg = 0x7fc323ac50, __canceltype = -1547381544, __prev = 0x7fc323a940}
_cleanup_routine = <optimized out>
thousands_sep = 0x0
grouping = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>
done = 26
f = 0x7fa2cd26d4 "%.*s"
lead_str_end = <optimized out>
end_of_spec = <optimized out>
work_buffer = "@\251#\303\177\000\000\000\020\251#\303\177\000\000\000\320\377\377\377\200\377\377\377\327\255#\303\177\000\000\000@\251#\303\177\000\000\000@\251#\303\177\000\000\000\020\251#\303\177\000\000\000\320\377\377\377\200\377\377\377\000\302w\226J\347\215R\340\255#\303\177\000\000\000\200\025\271\243\177\000\000\000\060\211\271\243\177\000\000\000P\221)xU\000\000\000@\256#\303\177\000\000\000\001\000\000\000\000\000\000\000d\221)xU\000\000\000\032Պ\243\177\000\000\000\005", '\000' <repeats 15 times>, "<name>", '\000' <repeats 16 times>, "\377\377\377\377\377\377\377\377\377\377\000\000\000\377\377\377\377\377", '\000' <repeats 14 times>...
workend = <optimized out>
ap_save = {__stack = 0x7fc323b3b0, __gr_top = 0x7fc323b3b0, __vr_top = 0x7fc323b390, __gr_offs = -16, __vr_offs = -128}
nspecs_done = 0
save_errno = <optimized out>
readonly_format = <optimized out>
do_longlong_number = <optimized out>
__result = <optimized out>
#3 0x0000007fa3a250a4 in __vsnprintf_internal (string=string@entry=0x7fc323ae48 " loaded private key from 1xU", maxlen=<optimized out>, maxlen@entry=1024,
format=format@entry=0x7fa2cd26ba " loaded private key from %.*s", args=..., mode_flags=mode_flags@entry=2) at vsnprintf.c:114
sf = {f = {_sbf = {_f = {_flags = -72515583, _IO_read_ptr = 0x7fc323ae48 " loaded private key from 1xU", _IO_read_end = 0x7fc323ae48 " loaded private key from 1xU",
_IO_read_base = 0x7fc323ae48 " loaded private key from 1xU", _IO_write_base = 0x7fc323ae48 " loaded private key from 1xU", _IO_write_ptr = 0x7fc323ae62 "1xU",
_IO_write_end = 0x7fc323b247 "", _IO_buf_base = 0x7fc323ae48 " loaded private key from 1xU", _IO_buf_end = 0x7fc323b247 "", _IO_save_base = 0x0, _IO_backup_base = 0x0,
_IO_save_end = 0x0, _markers = 0x0, _chain = 0x0, _fileno = 2016069088, _flags2 = 0, _old_offset = 3273895800, _cur_column = 0, _vtable_offset = 35 '#',
_shortbuf = <incomplete sequence \303>, _lock = 0x0, _offset = 548734741760, _codecvt = 0x7fa3882f08, _wide_data = 0xffffffffffffffff, _freeres_list = 0x0, _freeres_buf = 0x7fc323ad10,
__pad5 = 5948664990364320256, _mode = -1, _unused2 = "\177\000\000\000؉\271\243\177\000\000\000(6ˣ\177\000\000"}, vtable = 0x7fa3b4bec8 <_IO_strn_jumps>}, _s = {
_allocate_buffer_unused = 0x0, _free_buffer_unused = 0x6}},
overflow_buf = "\000\000\000\000\000\000\000\000h\257#\303\177\000\000\000\220\255#\303\177\000\000\000x\034ȣ\177\000\000\000\000P\316\242\177\000\000\000P\221)xU\000\000\000\200\256#\303\177\000\000\000\200\256#\303\177\000\000"}
ret = <optimized out>
#4 0x0000007fa3aa6118 in ___vsnprintf_chk (s=s@entry=0x7fc323ae48 " loaded private key from 1xU", maxlen=maxlen@entry=1024, flag=flag@entry=1, slen=slen@entry=18446744073709551615,
format=format@entry=0x7fa2cd26ba " loaded private key from %.*s", ap=<error reading variable: Cannot access memory at address 0x0>) at vsnprintf_chk.c:34
mode = 2
#5 0x0000007fa3b9150c in vsnprintf (__ap=..., __fmt=0x7fa2cd26ba " loaded private key from %.*s", __n=1024, __s=0x7fc323ae48 " loaded private key from 1xU") at /usr/include/bits/stdio2.h:68
No locals.
#6 vlog (this=0x5578299150, group=DBG_CFG, level=LEVEL_CTRL, format=0x7fa2cd26ba " loaded private key from %.*s", args=...) at ../../../strongswan-5.9.13/src/libcharon/bus/bus.c:399
buf = " loaded private key from 1xU\000\000\000\060\252\264\243\177\000\000\000\t\000\000\000\177\000\000\000\002\000\000\000\000\000\000\000\t\000\000\000\062", '\000' <repeats 27 times>, "|\000\000\000w\000\000\000n\000\000\000[\000\000\000\360\260#\303\177\000\000\000\240\260#\303\177\000\000\000\000\257#\303\177\000\000\000\244\203\212\243\177\000\000\000\003\000\000\000\000\000\000\000\240u\022", '\000' <repeats 13 times>, "p\310*xU\000\000\000\200\001\000\000\000\000\000\000\002\000\000\000\000\000\000\000\340\257#\303\177\000\000\000\200\235\212\243\177\000\000\000"...
len = <optimized out>
loggers = 0x5578299950
data = {ike_sa = 0x0, thread = 0, group = DBG_CFG, level = LEVEL_CTRL, message = 0x7fc323ae48 " loaded private key from 1xU", args = {__stack = 0x7fc323b3b0, __gr_top = 0x7fc323b3b0,
__vr_top = 0x7fc323b390, __gr_offs = -32, __vr_offs = -128}}
#7 0x0000007fa3b916b4 in log_ (this=<optimized out>, group=<optimized out>, level=<optimized out>, format=<optimized out>) at ../../../strongswan-5.9.13/src/libcharon/bus/bus.c:440
args = {__stack = 0x7fc323b3b0, __gr_top = 0x7fc323b3b0, __vr_top = 0x7fc323b390, __gr_offs = -32, __vr_offs = -128}
#8 0x0000007fa2ccb0c4 in ?? () from /opt/idcevo/sysroots/cortexa76-poky-linux/usr/lib/ipsec/plugins/libstrongswan-stroke.so
No symbol table info available.
#9 0x0000007fa2cca944 in ?? () from /opt/idcevo/sysroots/cortexa76-poky-linux/usr/lib/ipsec/plugins/libstrongswan-stroke.so
No symbol table info available.
#10 0x0000007fa2ccba58 in stroke_cred_create () from /opt/idcevo/sysroots/cortexa76-poky-linux/usr/lib/ipsec/plugins/libstrongswan-stroke.so
No symbol table info available.
#11 0x0000007fa2cc4a04 in stroke_socket_create () from /opt/idcevo/sysroots/cortexa76-poky-linux/usr/lib/ipsec/plugins/libstrongswan-stroke.so
No symbol table info available.
--Type <RET> for more, q to quit, c to continue without paging--
#12 0x0000007fa2cc32f8 in ?? () from /opt/idcevo/sysroots/cortexa76-poky-linux/usr/lib/ipsec/plugins/libstrongswan-stroke.so
No symbol table info available.
#13 0x0000007fa3c6c760 in load_feature (level=1, provided=0x55782f6850, this=0x5578292c30) at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:804
name = <optimized out>
provide = <optimized out>
#14 load_provided (level=0, provided=0x55782f6850, this=0x5578292c30) at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:878
name = <optimized out>
provide = <optimized out>
indent = 0
name = <optimized out>
provide = <optimized out>
indent = <optimized out>
#15 load_provided (this=0x5578292c30, provided=0x55782f6850, level=0) at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:845
name = <optimized out>
provide = <optimized out>
indent = <optimized out>
#16 0x0000007fa3c6d268 in load_features (this=0x5578292c30) at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:899
enumerator = 0x55782f91e0
inner = 0x55782f9210
plugin = 0x55782f6650
provided = 0x55782f6850
enumerator = <optimized out>
inner = <optimized out>
plugin = <optimized out>
provided = <optimized out>
#17 load_plugins (this=0x5578292c30, list=0x556bd62000 "a") at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:1298
enumerator = <optimized out>
default_path = 0x7fa3c889f5 "/usr/lib/ipsec/plugins"
plugins = 0x55782ad050 " pkcs11 aes des rc2 sha2 sha3 mgf1 random nonce x509 revocation pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp curve25519 xcbc cmac hmac kdf ctr ccm gcm drbg curl attr kern"...
token = 0x55782ad027 ""
critical_failed = <optimized out>
#18 0x0000007fa3b988cc in initialize (this=this@entry=0x55782a0f60,
plugins=0x556bd526bc "pkcs11 aes des rc2 sha2 sha3 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp curve25519 xcbc cmac hmac kdf ctr ccm gcm"...) at ../../../strongswan-5.9.13/src/libcharon/daemon.c:910
features = {{kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212251, key_size = 0}, aead = {alg = 2747212251, key_size = 0}, signer = 2747212251, prf = 2747212251,
xof = 2747212251, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21d8), drbg = 2747212251, hasher = 2747212251, ke = 2747212251,
rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21d8), privkey = 2747212251, privkey_gen = 2747212251, privkey_sign = 2747212251, privkey_decrypt = 2747212251, pubkey = 2747212251,
pubkey_verify = 2747212251, pubkey_encrypt = 2747212251, cert = 2747212251, container = 2747212251, eap = {type = 2747212251, vendor = 127},
database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21d8), fetcher = 0x7fa3bf21db "libcharon", custom = 0x7fa3bf21db "libcharon", xauth = 0x7fa3bf21db "libcharon", reg = {final = 219,
f = 0x0}, cb = {f = 0x7fa3bf21db, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_NONCE_GEN, arg = {crypter = {alg = 0, key_size = 0}, aead = {alg = 0, key_size = 0}, signer = 0,
prf = 0, xof = XOF_UNDEFINED, kdf = KDF_UNDEFINED, drbg = DRBG_UNDEFINED, hasher = 0, ke = KE_NONE, rng_quality = RNG_WEAK, privkey = KEY_ANY, privkey_gen = KEY_ANY,
privkey_sign = SIGN_UNKNOWN, privkey_decrypt = ENCRYPT_UNKNOWN, pubkey = KEY_ANY, pubkey_verify = SIGN_UNKNOWN, pubkey_encrypt = ENCRYPT_UNKNOWN, cert = CERT_ANY,
container = CONTAINER_PKCS7, eap = {type = 0, vendor = PEN_IETF}, database = DB_ANY, fetcher = 0x0, custom = 0x0, xauth = 0x0, reg = {final = false, f = 0x0}, cb = {f = 0x0, data = 0x0}}},
{kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212261, key_size = 0}, aead = {alg = 2747212261, key_size = 0}, signer = 2747212261, prf = 2747212261,
xof = 2747212261, kdf = (KDF_PRF | unknown: 0xa3bf21e4), drbg = 2747212261, hasher = 2747212261, ke = 2747212261, rng_quality = (RNG_STRONG | unknown: 0xa3bf21e4), privkey = 2747212261,
privkey_gen = 2747212261, privkey_sign = 2747212261, privkey_decrypt = 2747212261, pubkey = 2747212261, pubkey_verify = 2747212261, pubkey_encrypt = 2747212261, cert = 2747212261,
container = 2747212261, eap = {type = 2747212261, vendor = 127}, database = (DB_SQLITE | unknown: 0xa3bf21e4), fetcher = 0x7fa3bf21e5 "libcharon-sa-managers",
custom = 0x7fa3bf21e5 "libcharon-sa-managers", xauth = 0x7fa3bf21e5 "libcharon-sa-managers", reg = {final = 229, f = 0x0}, cb = {f = 0x7fa3bf21e5, data = 0x0}}}, {kind = FEATURE_DEPENDS,
type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212283, key_size = 0}, aead = {alg = 2747212283, key_size = 0}, signer = 2747212283, prf = 2747212283, xof = 2747212283,
kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21f8), drbg = 2747212283, hasher = 2747212283, ke = 2747212283, rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21f8),
privkey = 2747212283, privkey_gen = 2747212283, privkey_sign = 2747212283, privkey_decrypt = 2747212283, pubkey = 2747212283, pubkey_verify = 2747212283, pubkey_encrypt = 2747212283,
cert = 2747212283, container = 2747212283, eap = {type = 2747212283, vendor = 127}, database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21f8), fetcher = 0x7fa3bf21fb "libcharon-receiver",
custom = 0x7fa3bf21fb "libcharon-receiver", xauth = 0x7fa3bf21fb "libcharon-receiver", reg = {final = 251, f = 0x0}, cb = {f = 0x7fa3bf21fb, data = 0x0}}}, {kind = FEATURE_DEPENDS,
--Type <RET> for more, q to quit, c to continue without paging--
type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212302, key_size = 0}, aead = {alg = 2747212302, key_size = 0}, signer = 2747212302, prf = 2747212302, xof = 2747212302,
kdf = (KDF_PRF_PLUS | unknown: 0xa3bf220c), drbg = 2747212302, hasher = 2747212302, ke = 2747212302, rng_quality = (RNG_TRUE | unknown: 0xa3bf220c), privkey = 2747212302,
privkey_gen = 2747212302, privkey_sign = 2747212302, privkey_decrypt = 2747212302, pubkey = 2747212302, pubkey_verify = 2747212302, pubkey_encrypt = 2747212302, cert = 2747212302,
container = 2747212302, eap = {type = 2747212302, vendor = 127}, database = (DB_MYSQL | unknown: 0xa3bf220c), fetcher = 0x7fa3bf220e "kernel-ipsec", custom = 0x7fa3bf220e "kernel-ipsec",
xauth = 0x7fa3bf220e "kernel-ipsec", reg = {final = 14, f = 0x0}, cb = {f = 0x7fa3bf220e, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212315,
key_size = 0}, aead = {alg = 2747212315, key_size = 0}, signer = 2747212315, prf = 2747212315, xof = 2747212315, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf2218), drbg = 2747212315,
hasher = 2747212315, ke = 2747212315, rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf2218), privkey = 2747212315, privkey_gen = 2747212315, privkey_sign = 2747212315,
privkey_decrypt = 2747212315, pubkey = 2747212315, pubkey_verify = 2747212315, pubkey_encrypt = 2747212315, cert = 2747212315, container = 2747212315, eap = {type = 2747212315,
vendor = 127}, database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf2218), fetcher = 0x7fa3bf221b "kernel-net", custom = 0x7fa3bf221b "kernel-net", xauth = 0x7fa3bf221b "kernel-net", reg = {
final = 27, f = 0x0}, cb = {f = 0x7fa3bf221b, data = 0x0}}}, {kind = FEATURE_CALLBACK, type = FEATURE_NONE, arg = {crypter = {alg = 2746845820, key_size = 367088242528}, aead = {
alg = 2746845820, key_size = 367088242528}, signer = 2746845820, prf = 2746845820, xof = 2746845820, kdf = (unknown: 0xa3b98a7c), drbg = 2746845820, hasher = 2746845820, ke = 2746845820,
rng_quality = (unknown: 0xa3b98a7c), privkey = 2746845820, privkey_gen = 2746845820, privkey_sign = 2746845820, privkey_decrypt = 2746845820, pubkey = 2746845820,
pubkey_verify = 2746845820, pubkey_encrypt = 2746845820, cert = 2746845820, container = 2746845820, eap = {type = 2746845820, vendor = 127}, database = (unknown: 0xa3b98a7c),
fetcher = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003", custom = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003",
xauth = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003", reg = {final = 124, f = 0x55782a0f60}, cb = {f = 0x7fa3b98a7c <sender_receiver_cb>, data = 0x55782a0f60}}}, {
kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212283, key_size = 0}, aead = {alg = 2747212283, key_size = 0}, signer = 2747212283, prf = 2747212283,
xof = 2747212283, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21f8), drbg = 2747212283, hasher = 2747212283, ke = 2747212283,
rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21f8), privkey = 2747212283, privkey_gen = 2747212283, privkey_sign = 2747212283, privkey_decrypt = 2747212283, pubkey = 2747212283,
pubkey_verify = 2747212283, pubkey_encrypt = 2747212283, cert = 2747212283, container = 2747212283, eap = {type = 2747212283, vendor = 127},
database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21f8), fetcher = 0x7fa3bf21fb "libcharon-receiver", custom = 0x7fa3bf21fb "libcharon-receiver", xauth = 0x7fa3bf21fb "libcharon-receiver",
reg = {final = 251, f = 0x0}, cb = {f = 0x7fa3bf21fb, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_HASHER, arg = {crypter = {alg = ENCR_DES_IV64, key_size = 0}, aead = {
alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1, kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1, hasher = HASH_SHA1, ke = MODP_768_BIT,
rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL, privkey_decrypt = ENCRYPT_RSA_PKCS1, pubkey = KEY_RSA,
pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA, eap = {type = EAP_IDENTITY, vendor = PEN_IETF},
database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>,
xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_RNG, arg = {crypter = {
alg = ENCR_DES_IV64, key_size = 0}, aead = {alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1, kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1,
hasher = HASH_SHA1, ke = MODP_768_BIT, rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL, privkey_decrypt = ENCRYPT_RSA_PKCS1,
pubkey = KEY_RSA, pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA, eap = {type = EAP_IDENTITY,
vendor = PEN_IETF}, database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>,
xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {
alg = 2747212326, key_size = 0}, aead = {alg = 2747212326, key_size = 0}, signer = 2747212326, prf = 2747212326, xof = 2747212326, kdf = (KDF_PRF_PLUS | unknown: 0xa3bf2224),
drbg = 2747212326, hasher = 2747212326, ke = 2747212326, rng_quality = (RNG_TRUE | unknown: 0xa3bf2224), privkey = 2747212326, privkey_gen = 2747212326, privkey_sign = 2747212326,
privkey_decrypt = 2747212326, pubkey = 2747212326, pubkey_verify = 2747212326, pubkey_encrypt = 2747212326, cert = 2747212326, container = 2747212326, eap = {type = 2747212326,
vendor = 127}, database = (DB_MYSQL | unknown: 0xa3bf2224), fetcher = 0x7fa3bf2226 "socket", custom = 0x7fa3bf2226 "socket", xauth = 0x7fa3bf2226 "socket", reg = {final = 38, f = 0x0},
cb = {f = 0x7fa3bf2226, data = 0x0}}}, {kind = FEATURE_CALLBACK, type = FEATURE_NONE, arg = {crypter = {alg = 2746845704, key_size = 367088242528}, aead = {alg = 2746845704,
key_size = 367088242528}, signer = 2746845704, prf = 2746845704, xof = 2746845704, kdf = (unknown: 0xa3b98a08), drbg = 2746845704, hasher = 2746845704, ke = 2746845704,
rng_quality = (unknown: 0xa3b98a08), privkey = 2746845704, privkey_gen = 2746845704, privkey_sign = 2746845704, privkey_decrypt = 2746845704, pubkey = 2746845704,
pubkey_verify = 2746845704, pubkey_encrypt = 2746845704, cert = 2746845704, container = 2746845704, eap = {type = 2746845704, vendor = 127}, database = (unknown: 0xa3b98a08),
fetcher = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003", custom = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003",
xauth = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003", reg = {final = 8, f = 0x55782a0f60}, cb = {f = 0x7fa3b98a08 <sa_managers_cb>, data = 0x55782a0f60}}}, {
kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212261, key_size = 0}, aead = {alg = 2747212261, key_size = 0}, signer = 2747212261, prf = 2747212261,
xof = 2747212261, kdf = (KDF_PRF | unknown: 0xa3bf21e4), drbg = 2747212261, hasher = 2747212261, ke = 2747212261, rng_quality = (RNG_STRONG | unknown: 0xa3bf21e4), privkey = 2747212261,
privkey_gen = 2747212261, privkey_sign = 2747212261, privkey_decrypt = 2747212261, pubkey = 2747212261, pubkey_verify = 2747212261, pubkey_encrypt = 2747212261, cert = 2747212261,
container = 2747212261, eap = {type = 2747212261, vendor = 127}, database = (DB_SQLITE | unknown: 0xa3bf21e4), fetcher = 0x7fa3bf21e5 "libcharon-sa-managers",
custom = 0x7fa3bf21e5 "libcharon-sa-managers", xauth = 0x7fa3bf21e5 "libcharon-sa-managers", reg = {final = 229, f = 0x0}, cb = {f = 0x7fa3bf21e5, data = 0x0}}}, {kind = FEATURE_DEPENDS,
type = FEATURE_HASHER, arg = {crypter = {alg = ENCR_DES_IV64, key_size = 0}, aead = {alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1,
kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1, hasher = HASH_SHA1, ke = MODP_768_BIT, rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL,
privkey_decrypt = ENCRYPT_RSA_PKCS1, pubkey = KEY_RSA, pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA,
eap = {type = EAP_IDENTITY, vendor = PEN_IETF}, database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>,
xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_RNG, arg = {crypter = {
alg = 0, key_size = 0}, aead = {alg = 0, key_size = 0}, signer = 0, prf = 0, xof = XOF_UNDEFINED, kdf = KDF_UNDEFINED, drbg = DRBG_UNDEFINED, hasher = 0, ke = KE_NONE,
rng_quality = RNG_WEAK, privkey = KEY_ANY, privkey_gen = KEY_ANY, privkey_sign = SIGN_UNKNOWN, privkey_decrypt = ENCRYPT_UNKNOWN, pubkey = KEY_ANY, pubkey_verify = SIGN_UNKNOWN,
pubkey_encrypt = ENCRYPT_UNKNOWN, cert = CERT_ANY, container = CONTAINER_PKCS7, eap = {type = 0, vendor = PEN_IETF}, database = DB_ANY, fetcher = 0x0, custom = 0x0, xauth = 0x0, reg = {
--Type <RET> for more, q to quit, c to continue without paging--
final = false, f = 0x0}, cb = {f = 0x0, data = 0x0}}}}
#19 load_plugins (this=0x5578292c30, list=0x556bd62000 "a") at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:1298
enumerator = <optimized out>
default_path = 0x7fa3c889f5 "/usr/lib/ipsec/plugins"
plugins = 0x55782ad050 " pkcs11 aes des rc2 sha2 sha3 mgf1 random nonce x509 revocation pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp curve25519 xcbc cmac hmac kdf ctr ccm gcm drbg curl attr kern"...
token = 0x55782ad027 ""
critical_failed = <optimized out>
#20 0x0000007fa3b988cc in initialize (this=this@entry=0x55782a0f60,
plugins=0x556bd526bc "pkcs11 aes des rc2 sha2 sha3 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp curve25519 xcbc cmac hmac kdf ctr ccm gcm"...) at ../../../strongswan-5.9.13/src/libcharon/daemon.c:910
features = {{kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212251, key_size = 0}, aead = {alg = 2747212251, key_size = 0}, signer = 2747212251, prf = 2747212251,
xof = 2747212251, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21d8), drbg = 2747212251, hasher = 2747212251, ke = 2747212251,
--Type <RET> for more, q to quit, c to continue without paging--RET
rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21d8), privkey = 2747212251, privkey_gen = 2747212251, privkey_sign = 2747212251, privkey_decrypt = 2747212251, pubkey = 2747212251,
pubkey_verify = 2747212251, pubkey_encrypt = 2747212251, cert = 2747212251, container = 2747212251, eap = {type = 2747212251, vendor = 127},
database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21d8), fetcher = 0x7fa3bf21db "libcharon", custom = 0x7fa3bf21db "libcharon", xauth = 0x7fa3bf21db "libcharon", reg = {final = 219,
f = 0x0}, cb = {f = 0x7fa3bf21db, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_NONCE_GEN, arg = {crypter = {alg = 0, key_size = 0}, aead = {alg = 0, key_size = 0}, signer = 0,
prf = 0, xof = XOF_UNDEFINED, kdf = KDF_UNDEFINED, drbg = DRBG_UNDEFINED, hasher = 0, ke = KE_NONE, rng_quality = RNG_WEAK, privkey = KEY_ANY, privkey_gen = KEY_ANY,
privkey_sign = SIGN_UNKNOWN, privkey_decrypt = ENCRYPT_UNKNOWN, pubkey = KEY_ANY, pubkey_verify = SIGN_UNKNOWN, pubkey_encrypt = ENCRYPT_UNKNOWN, cert = CERT_ANY,
container = CONTAINER_PKCS7, eap = {type = 0, vendor = PEN_IETF}, database = DB_ANY, fetcher = 0x0, custom = 0x0, xauth = 0x0, reg = {final = false, f = 0x0}, cb = {f = 0x0, data = 0x0}}},
{kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212261, key_size = 0}, aead = {alg = 2747212261, key_size = 0}, signer = 2747212261, prf = 2747212261,
xof = 2747212261, kdf = (KDF_PRF | unknown: 0xa3bf21e4), drbg = 2747212261, hasher = 2747212261, ke = 2747212261, rng_quality = (RNG_STRONG | unknown: 0xa3bf21e4), privkey = 2747212261,
privkey_gen = 2747212261, privkey_sign = 2747212261, privkey_decrypt = 2747212261, pubkey = 2747212261, pubkey_verify = 2747212261, pubkey_encrypt = 2747212261, cert = 2747212261,
container = 2747212261, eap = {type = 2747212261, vendor = 127}, database = (DB_SQLITE | unknown: 0xa3bf21e4), fetcher = 0x7fa3bf21e5 "libcharon-sa-managers",
custom = 0x7fa3bf21e5 "libcharon-sa-managers", xauth = 0x7fa3bf21e5 "libcharon-sa-managers", reg = {final = 229, f = 0x0}, cb = {f = 0x7fa3bf21e5, data = 0x0}}}, {kind = FEATURE_DEPENDS,
type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212283, key_size = 0}, aead = {alg = 2747212283, key_size = 0}, signer = 2747212283, prf = 2747212283, xof = 2747212283,
kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21f8), drbg = 2747212283, hasher = 2747212283, ke = 2747212283, rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21f8),
privkey = 2747212283, privkey_gen = 2747212283, privkey_sign = 2747212283, privkey_decrypt = 2747212283, pubkey = 2747212283, pubkey_verify = 2747212283, pubkey_encrypt = 2747212283,
cert = 2747212283, container = 2747212283, eap = {type = 2747212283, vendor = 127}, database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21f8), fetcher = 0x7fa3bf21fb "libcharon-receiver",
custom = 0x7fa3bf21fb "libcharon-receiver", xauth = 0x7fa3bf21fb "libcharon-receiver", reg = {final = 251, f = 0x0}, cb = {f = 0x7fa3bf21fb, data = 0x0}}}, {kind = FEATURE_DEPENDS,
type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212302, key_size = 0}, aead = {alg = 2747212302, key_size = 0}, signer = 2747212302, prf = 2747212302, xof = 2747212302,
kdf = (KDF_PRF_PLUS | unknown: 0xa3bf220c), drbg = 2747212302, hasher = 2747212302, ke = 2747212302, rng_quality = (RNG_TRUE | unknown: 0xa3bf220c), privkey = 2747212302,
privkey_gen = 2747212302, privkey_sign = 2747212302, privkey_decrypt = 2747212302, pubkey = 2747212302, pubkey_verify = 2747212302, pubkey_encrypt = 2747212302, cert = 2747212302,
container = 2747212302, eap = {type = 2747212302, vendor = 127}, database = (DB_MYSQL | unknown: 0xa3bf220c), fetcher = 0x7fa3bf220e "kernel-ipsec", custom = 0x7fa3bf220e "kernel-ipsec",
xauth = 0x7fa3bf220e "kernel-ipsec", reg = {final = 14, f = 0x0}, cb = {f = 0x7fa3bf220e, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212315,
key_size = 0}, aead = {alg = 2747212315, key_size = 0}, signer = 2747212315, prf = 2747212315, xof = 2747212315, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf2218), drbg = 2747212315,
hasher = 2747212315, ke = 2747212315, rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf2218), privkey = 2747212315, privkey_gen = 2747212315, privkey_sign = 2747212315,
privkey_decrypt = 2747212315, pubkey = 2747212315, pubkey_verify = 2747212315, pubkey_encrypt = 2747212315, cert = 2747212315, container = 2747212315, eap = {type = 2747212315,
vendor = 127}, database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf2218), fetcher = 0x7fa3bf221b "kernel-net", custom = 0x7fa3bf221b "kernel-net", xauth = 0x7fa3bf221b "kernel-net", reg = {
final = 27, f = 0x0}, cb = {f = 0x7fa3bf221b, data = 0x0}}}, {kind = FEATURE_CALLBACK, type = FEATURE_NONE, arg = {crypter = {alg = 2746845820, key_size = 367088242528}, aead = {
alg = 2746845820, key_size = 367088242528}, signer = 2746845820, prf = 2746845820, xof = 2746845820, kdf = (unknown: 0xa3b98a7c), drbg = 2746845820, hasher = 2746845820, ke = 2746845820,
rng_quality = (unknown: 0xa3b98a7c), privkey = 2746845820, privkey_gen = 2746845820, privkey_sign = 2746845820, privkey_decrypt = 2746845820, pubkey = 2746845820,
pubkey_verify = 2746845820, pubkey_encrypt = 2746845820, cert = 2746845820, container = 2746845820, eap = {type = 2746845820, vendor = 127}, database = (unknown: 0xa3b98a7c),
fetcher = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003", custom = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003",
xauth = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003", reg = {final = 124, f = 0x55782a0f60}, cb = {f = 0x7fa3b98a7c <sender_receiver_cb>, data = 0x55782a0f60}}}, {
kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212283, key_size = 0}, aead = {alg = 2747212283, key_size = 0}, signer = 2747212283, prf = 2747212283,
xof = 2747212283, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21f8), drbg = 2747212283, hasher = 2747212283, ke = 2747212283,
rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21f8), privkey = 2747212283, privkey_gen = 2747212283, privkey_sign = 2747212283, privkey_decrypt = 2747212283, pubkey = 2747212283,
pubkey_verify = 2747212283, pubkey_encrypt = 2747212283, cert = 2747212283, container = 2747212283, eap = {type = 2747212283, vendor = 127},
database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21f8), fetcher = 0x7fa3bf21fb "libcharon-receiver", custom = 0x7fa3bf21fb "libcharon-receiver", xauth = 0x7fa3bf21fb "libcharon-receiver",
reg = {final = 251, f = 0x0}, cb = {f = 0x7fa3bf21fb, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_HASHER, arg = {crypter = {alg = ENCR_DES_IV64, key_size = 0}, aead = {
alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1, kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1, hasher = HASH_SHA1, ke = MODP_768_BIT,
rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL, privkey_decrypt = ENCRYPT_RSA_PKCS1, pubkey = KEY_RSA,
pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA, eap = {type = EAP_IDENTITY, vendor = PEN_IETF},
database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>,
xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_RNG, arg = {crypter = {
alg = ENCR_DES_IV64, key_size = 0}, aead = {alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1, kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1,
hasher = HASH_SHA1, ke = MODP_768_BIT, rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL, privkey_decrypt = ENCRYPT_RSA_PKCS1,
pubkey = KEY_RSA, pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA, eap = {type = EAP_IDENTITY,
vendor = PEN_IETF}, database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>,
xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {
alg = 2747212326, key_size = 0}, aead = {alg = 2747212326, key_size = 0}, signer = 2747212326, prf = 2747212326, xof = 2747212326, kdf = (KDF_PRF_PLUS | unknown: 0xa3bf2224),
drbg = 2747212326, hasher = 2747212326, ke = 2747212326, rng_quality = (RNG_TRUE | unknown: 0xa3bf2224), privkey = 2747212326, privkey_gen = 2747212326, privkey_sign = 2747212326,
privkey_decrypt = 2747212326, pubkey = 2747212326, pubkey_verify = 2747212326, pubkey_encrypt = 2747212326, cert = 2747212326, container = 2747212326, eap = {type = 2747212326,
vendor = 127}, database = (DB_MYSQL | unknown: 0xa3bf2224), fetcher = 0x7fa3bf2226 "socket", custom = 0x7fa3bf2226 "socket", xauth = 0x7fa3bf2226 "socket", reg = {final = 38, f = 0x0},
--Type <RET> for more, q to quit, c to continue without paging--RET
cb = {f = 0x7fa3bf2226, data = 0x0}}}, {kind = FEATURE_CALLBACK, type = FEATURE_NONE, arg = {crypter = {alg = 2746845704, key_size = 367088242528}, aead = {alg = 2746845704,
key_size = 367088242528}, signer = 2746845704, prf = 2746845704, xof = 2746845704, kdf = (unknown: 0xa3b98a08), drbg = 2746845704, hasher = 2746845704, ke = 2746845704,
rng_quality = (unknown: 0xa3b98a08), privkey = 2746845704, privkey_gen = 2746845704, privkey_sign = 2746845704, privkey_decrypt = 2746845704, pubkey = 2746845704,
pubkey_verify = 2746845704, pubkey_encrypt = 2746845704, cert = 2746845704, container = 2746845704, eap = {type = 2746845704, vendor = 127}, database = (unknown: 0xa3b98a08),
fetcher = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003", custom = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003",
xauth = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003", reg = {final = 8, f = 0x55782a0f60}, cb = {f = 0x7fa3b98a08 <sa_managers_cb>, data = 0x55782a0f60}}}, {
kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212261, key_size = 0}, aead = {alg = 2747212261, key_size = 0}, signer = 2747212261, prf = 2747212261,
xof = 2747212261, kdf = (KDF_PRF | unknown: 0xa3bf21e4), drbg = 2747212261, hasher = 2747212261, ke = 2747212261, rng_quality = (RNG_STRONG | unknown: 0xa3bf21e4), privkey = 2747212261,
privkey_gen = 2747212261, privkey_sign = 2747212261, privkey_decrypt = 2747212261, pubkey = 2747212261, pubkey_verify = 2747212261, pubkey_encrypt = 2747212261, cert = 2747212261,
container = 2747212261, eap = {type = 2747212261, vendor = 127}, database = (DB_SQLITE | unknown: 0xa3bf21e4), fetcher = 0x7fa3bf21e5 "libcharon-sa-managers",
custom = 0x7fa3bf21e5 "libcharon-sa-managers", xauth = 0x7fa3bf21e5 "libcharon-sa-managers", reg = {final = 229, f = 0x0}, cb = {f = 0x7fa3bf21e5, data = 0x0}}}, {kind = FEATURE_DEPENDS,
type = FEATURE_HASHER, arg = {crypter = {alg = ENCR_DES_IV64, key_size = 0}, aead = {alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1,
kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1, hasher = HASH_SHA1, ke = MODP_768_BIT, rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL,
privkey_decrypt = ENCRYPT_RSA_PKCS1, pubkey = KEY_RSA, pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA,
eap = {type = EAP_IDENTITY, vendor = PEN_IETF}, database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>,
xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_RNG, arg = {crypter = {
alg = 0, key_size = 0}, aead = {alg = 0, key_size = 0}, signer = 0, prf = 0, xof = XOF_UNDEFINED, kdf = KDF_UNDEFINED, drbg = DRBG_UNDEFINED, hasher = 0, ke = KE_NONE,
rng_quality = RNG_WEAK, privkey = KEY_ANY, privkey_gen = KEY_ANY, privkey_sign = SIGN_UNKNOWN, privkey_decrypt = ENCRYPT_UNKNOWN, pubkey = KEY_ANY, pubkey_verify = SIGN_UNKNOWN,
pubkey_encrypt = ENCRYPT_UNKNOWN, cert = CERT_ANY, container = CONTAINER_PKCS7, eap = {type = 0, vendor = PEN_IETF}, database = DB_ANY, fetcher = 0x0, custom = 0x0, xauth = 0x0, reg = {
final = false, f = 0x0}, cb = {f = 0x0, data = 0x0}}}}
#21 0x000000556bd51a14 in main (argc=<optimized out>, argv=<optimized out>) at ../../../strongswan-5.9.13/src/charon/charon.c:421
action = {__sigaction_handler = {sa_handler = 0x7fc323ee00, sa_sigaction = 0x7fc323ee00}, sa_mask = {__val = {548208951436, 548734758416, 548208914332, 548205715720, 110527149, 110527148,
548205713624, 548209085376, 548734758528, 548734758496, 548208876996, 548734758480, 548206930060, 1, 548209115832, 1}}, sa_flags = 41943040, sa_restorer = 0x7fc323ee80}
group = 18
status = 66
utsname = {sysname = "Linux", '\000' <repeats 59 times>, nodename = "idcevo", '\000' <repeats 58 times>, release = "5.15.74", '\000' <repeats 57 times>,
version = "#1 SMP PREEMPT Mon May 20 06:09:14 UTC 2024", '\000' <repeats 21 times>, machine = "aarch64", '\000' <repeats 57 times>, __domainname = "(none)", '\000' <repeats 58 times>}
levels = {LEVEL_CTRL <repeats 18 times>}
use_syslog = false
(gdb)