/testing/guestbin/swan-prep --x509
Preparing X.509 files
west #
 ipsec _stackmanager start
west #
 # confirm that the network is alive
west #
 ../../pluto/bin/wait-until-alive -I 192.0.1.254 192.0.2.254
destination -I 192.0.1.254 192.0.2.254 is alive
west #
 PATH/libexec/ipsec/pluto --config /etc/ipsec.conf --leak-detective
west #
 /testing/pluto/bin/wait-until-pluto-started
west #
 ipsec auto --add westnet-eastnet-ikev2
002 added connection description "westnet-eastnet-ikev2"
west #
 echo "initdone"
initdone
west #
 ipsec whack --debug-all --impair-retransmits
west #
 ipsec auto --up  westnet-eastnet-ikev2
002 "westnet-eastnet-ikev2" #1: initiating Main Mode
104 "westnet-eastnet-ikev2" #1: STATE_MAIN_I1: initiate
002 "westnet-eastnet-ikev2" #1: suppressing retransmit because IMPAIR_RETRANSMITS is set
031 "westnet-eastnet-ikev2" #1: max number of retransmissions (0) reached STATE_MAIN_I1.  No response (or no acceptable response) to our first IKEv1 message
002 "westnet-eastnet-ikev2" #1: deleting state (STATE_MAIN_I1)
west #
 echo done
done
west #
 ipsec whack --shutdown
002 shutting down
west #
 grep leak /tmp/pluto.log
leak-detective enabled
leak: EVENT_LOG_DAILY, item size: 32
leak: EVENT_SHUNT_SCAN, item size: 32
leak: kernel integ, item size: 32
leak: EVENT_PENDING_PHASE2, item size: 32
leak: EVENT_PENDING_DDNS, item size: 32
leak: EVENT_REINIT_SECRET, item size: 32
leak detective found 6 leaks, total size 192
west #
 if [ -n "`ls /tmp/core* 2>/dev/null`" ]; then echo CORE FOUND; mv /tmp/core* OUTPUT/; fi
west #
 if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi

