openssl-0.9.6 on solaris 2.6 (sparc).
it compiled just fine, but failed on tests - the full output is included below.
what should i do now?  is it ok to install?


best regards,
gl


-=-=-= cut here =-=-=-
ultra# make test
Doing certs
ICE-CA.pem => 6bee6be3.0
ICE-root.pem => adbec561.0
ICE-user.pem => 3ecf89a3.0
ca-cert.pem => 1f6c59cd.0
dsa-ca.pem => 73912336.0
dsa-pca.pem => 24867d38.0
factory.pem => f3e90025.0
nortelCA.pem => 1ef89214.0
pca-cert.pem => 8caad35e.0
rsa-cca.pem => a99c5886.0
rsa-ssca.pem => f73e89fd.0
thawteCb.pem => ddc328ff.0
thawteCp.pem => c33a80d4.0
timCA.pem => 8c401b31.0
tjhCA.pem => 052eae11.0
vsign1.pem => 2edf7016.0
vsign2.pem => b5f329fa.0
vsign3.pem => 7651b327.0
vsignss.pem => f73e89fd.1
vsigntca.pem => 18d46017.0
touch rehash.time
testing...
./destest
Doing cbcm
Doing ecb
Doing ede ecb
Doing cbc
Doing desx cbc
Doing ede cbc
Doing pcbc
Doing cfb8 cfb16 cfb32 cfb48 cfb64 cfb64() ede_cfb64() done
Doing ofb
Doing ofb64
Doing ede_ofb64
Doing cbc_cksum
Doing quad_cksum
input word alignment test 0 1 2 3
output word alignment test 0 1 2 3
fast crypt test 
./ideatest
ecb idea ok
cbc idea ok
cfb64 idea ok
./shatest
test 1 ok
test 2 ok
test 3 ok
./sha1test
test 1 ok
test 2 ok
test 3 ok
./md4test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./md5test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./hmactest
test 0 ok
test 1 ok
test 2 ok
test 3 ok
./md2test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./mdc2test
pad1 - ok
pad2 - ok
./rmdtest
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
test 8 ok
./rc2test
ecb RC2 ok
./rc4test
test 0 ok
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test end processing ....................done
test multi-call ....................done
./rc5test
ecb RC5 ok
cbc RC5 ok
./bftest
testing blowfish in raw ecb mode
testing blowfish in ecb mode
testing blowfish set_key
testing blowfish in cbc mode
testing blowfish in cfb64 mode
testing blowfish in ofb64
./casttest
ecb cast5 ok
This test will take some time....123456789ABCDEF ok
./randtest
test 1 done
test 2 done
test 3 done
test 4 done
starting big number library test, could take a while...
test BN_add
test BN_sub
test BN_lshift1
test BN_lshift (fixed)
test BN_lshift
test BN_rshift1
test BN_rshift
test BN_sqr
test BN_mul
test BN_div
test BN_div_recp
test BN_mod
test BN_mod_mul
test BN_mont
test BN_mod_exp
test BN_exp
running bc
.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!
 .!
......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Failed! bc:
-6768732EE43E9963A50EEADEA3D910149D4831B704957A3B7BEDA09D5A66299BD4C2D\
*** Error code 255
make: Fatal error: Command failed for target `test_bn'
Current working directory /install/temp1/openssl-0.9.6/test
*** Error code 1
make: Fatal error: Command failed for target `tests'
-=-=-= cut here =-=-=-



-- 
B  Grzegorz Labe                      y<AT>tech.us.edu.pl
O                                                        
F  Centrum Techniki Obliczeniowej  Uniwersytetu Slaskiego
H           FYI: I work for CTO US, but speak for myself.
making all in crypto...
making all in crypto/md2...
making all in crypto/md4...
making all in crypto/md5...
making all in crypto/sha...
making all in crypto/mdc2...
making all in crypto/hmac...
making all in crypto/ripemd...
making all in crypto/des...
making all in crypto/rc2...
making all in crypto/rc4...
making all in crypto/rc5...
making all in crypto/idea...
making all in crypto/bf...
making all in crypto/cast...
making all in crypto/bn...
making all in crypto/rsa...
making all in crypto/dsa...
making all in crypto/dh...
making all in crypto/dso...
making all in crypto/buffer...
making all in crypto/bio...
making all in crypto/stack...
making all in crypto/lhash...
making all in crypto/rand...
making all in crypto/err...
making all in crypto/objects...
making all in crypto/evp...
making all in crypto/asn1...
making all in crypto/pem...
making all in crypto/x509...
making all in crypto/x509v3...
making all in crypto/conf...
making all in crypto/txt_db...
making all in crypto/pkcs7...
making all in crypto/pkcs12...
making all in crypto/comp...
making all in ssl...
making all in rsaref...
making all in apps...
making all in test...
making all in tools...
testing...
./destest
Doing cbcm
Doing ecb
Doing ede ecb
Doing cbc
Doing desx cbc
Doing ede cbc
Doing pcbc
Doing cfb8 cfb16 cfb32 cfb48 cfb64 cfb64() ede_cfb64() done
Doing ofb
Doing ofb64
Doing ede_ofb64
Doing cbc_cksum
Doing quad_cksum
input word alignment test 0 1 2 3
output word alignment test 0 1 2 3
fast crypt test 
./ideatest
ecb idea ok
cbc idea ok
cfb64 idea ok
./shatest
test 1 ok
test 2 ok
test 3 ok
./sha1test
test 1 ok
test 2 ok
test 3 ok
./md4test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./md5test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./hmactest
test 0 ok
test 1 ok
test 2 ok
test 3 ok
./md2test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./mdc2test
pad1 - ok
pad2 - ok
./rmdtest
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
test 8 ok
./rc2test
ecb RC2 ok
./rc4test
test 0 ok
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test end processing ....................done
test multi-call ....................done
./rc5test
ecb RC5 ok
cbc RC5 ok
./bftest
testing blowfish in raw ecb mode
testing blowfish in ecb mode
testing blowfish set_key
testing blowfish in cbc mode
testing blowfish in cfb64 mode
testing blowfish in ofb64
./casttest
ecb cast5 ok
This test will take some time....123456789ABCDEF ok
./randtest
test 1 done
test 2 done
test 3 done
test 4 done
starting big number library test, could take a while...
test BN_add
test BN_sub
test BN_lshift1
test BN_lshift (fixed)
test BN_lshift
test BN_rshift1
test BN_rshift
test BN_sqr
test BN_mul
test BN_div
test BN_div_recp
test BN_mod
test BN_mod_mul
test BN_mont
test BN_mod_exp
test BN_exp
running bc
.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
1815 tests passed
test a^b%c implementations
./exptest
........................................................................................................................................................................................................
 done
cat
base64
base64
base64 base64
bf
bf base64
bf-cbc
bf-cbc base64
bf-cfb
bf-cfb base64
bf-ecb
bf-ecb base64
bf-ofb
bf-ofb base64
cast
cast base64
cast-cbc
cast-cbc base64
cast5-cbc
cast5-cbc base64
cast5-cfb
cast5-cfb base64
cast5-ecb
cast5-ecb base64
cast5-ofb
cast5-ofb base64
des
des base64
des-cbc
des-cbc base64
des-cfb
des-cfb base64
des-ecb
des-ecb base64
des-ede
des-ede base64
des-ede-cbc
des-ede-cbc base64
des-ede-cfb
des-ede-cfb base64
des-ede-ofb
des-ede-ofb base64
des-ede3
des-ede3 base64
des-ede3-cbc
des-ede3-cbc base64
des-ede3-cfb
des-ede3-cfb base64
des-ede3-ofb
des-ede3-ofb base64
des-ofb
des-ofb base64
des3
des3 base64
desx
desx base64
idea
idea base64
idea-cbc
idea-cbc base64
idea-cfb
idea-cfb base64
idea-ecb
idea-ecb base64
idea-ofb
idea-ofb base64
rc2
rc2 base64
rc2-40-cbc
rc2-40-cbc base64
rc2-64-cbc
rc2-64-cbc base64
rc2-cbc
rc2-cbc base64
rc2-cfb
rc2-cfb base64
rc2-ecb
rc2-ecb base64
rc2-ofb
rc2-ofb base64
rc4
rc4 base64
rc4-40
rc4-40 base64
rc5
rc5 base64
rc5-cbc
rc5-cbc base64
rc5-cfb
rc5-cfb base64
rc5-ecb
rc5-ecb base64
rc5-ofb
rc5-ofb base64
echo test normal x509v1 certificate
test normal x509v1 certificate
sh ./tx509 2>/dev/null
testing X509 conversions
p -> d
p -> n
p -> p
d -> d
n -> d
p -> d
d -> n
n -> n
p -> n
d -> p
n -> p
p -> p
echo test first x509v3 certificate
test first x509v3 certificate
sh ./tx509 v3-cert1.pem 2>/dev/null
testing X509 conversions
p -> d
p -> n
p -> p
d -> d
n -> d
p -> d
d -> n
n -> n
p -> n
d -> p
n -> p
p -> p
echo test second x509v3 certificate
test second x509v3 certificate
sh ./tx509 v3-cert2.pem 2>/dev/null
testing X509 conversions
p -> d
p -> n
p -> p
d -> d
n -> d
p -> d
d -> n
n -> n
p -> n
d -> p
n -> p
p -> p
rsa
testing rsa conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
./rsa_test
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
testing crl conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
testing session-id conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
Generate and verify a certificate request
generating certificate request
rsa
There should be a 2 sequences of .'s and some +'s.
There should not be more that at most 80 per line
This could take some time.
Using configuration from test.cnf
Generating a 512 bit RSA private key
.......................++++++++++++
......++++++++++++
writing new private key to 'testkey.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
State or Province Name (full name) [Queensland]:
Locality Name (eg, city) []:Brisbane
Organization Name (eg, company) []:CryptSoft Pty Ltd
Organizational Unit Name (eg, section) []:.
Common Name (eg, YOUR name) []:Eric Young
Email Address []:[EMAIL PROTECTED]
Using configuration from test.cnf
verify OK
testing req conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
testing req conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
testing pkcs7 conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
testing pkcs7 conversions (2)
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
The following command should have some OK's and some failures
There are definitly a few expired certificates
../apps/openssl verify -CApath ../certs ../certs/*.pem
../certs/ICE-CA.pem: /O=European ICE-TEL project/OU=V3-Certification Authority
error 10 at 1 depth lookup:Certificate has expired
/O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/ICE-root.pem: /O=European ICE-TEL project/OU=V3-Certification Authority
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/ICE-user.pem: /O=European ICE-TEL project/OU=V3-Certification Authority
error 10 at 2 depth lookup:Certificate has expired
/O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt
error 10 at 1 depth lookup:Certificate has expired
/O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt/CN=USER
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/ca-cert.pem: OK
../certs/dsa-ca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=PCA
error 10 at 1 depth lookup:Certificate has expired
/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=CA
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/dsa-pca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=PCA
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/factory.pem: /C=GB/O=UCL/OU=ICE-TEL Project/CN=TrustFactory
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/nortelCA.pem: OK
../certs/pca-cert.pem: OK
../certs/rsa-cca.pem: /C=US/O=RSA Data Security, Inc./OU=Commercial Certification 
Authority
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/rsa-ssca.pem: /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification 
Authority
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/thawteCb.pem: OK
../certs/thawteCp.pem: OK
../certs/timCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty 
Ltd/OU=development/CN=CryptSoft Dev CA
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/tjhCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty Ltd/OU=WORTHLESS 
CERTIFICATION AUTHORITIES/CN=ZERO VALUE CA - DEMONSTRATION PURPOSES ONLY
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/vsign1.pem: OK
../certs/vsign2.pem: OK
../certs/vsign3.pem: OK
../certs/vsignss.pem: /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification 
Authority
error 18 at 0 depth lookup:self signed certificate
OK
../certs/vsigntca.pem: OK
Generate a set of DH parameters
./dhtest
..........+.++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*

p    =A1793BCCF117AEFF
g    =5
pri 1=5620BF1C787CB04E
pub 1=367765DEE376CCED
pri 2=6872DB49E4A9F6FC
pub 2=8D3A4EA36659EB9B
key1 =4E70DDDDDB33B599
key2 =4E70DDDDDB33B599
Generate a set of DSA parameters
./dsatest
test generation of DSA parameters
.++++++++++++++++++++++++++++++++++++++++++++++++++*
...+........+..+...+............+.+..+..........................................................................+++++++++++++++++++++++++++++++++++++++++++++++++++*
seed
D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3 
counter=105 h=2
P:   
    00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68:
    69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d:
    78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac:
    32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36:
    ee:31:c8:02:91
Q:   
    00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30:
    f4:8e:da:ce:91:5f
G:   
    62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5:
    00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce:
    2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21:
    92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53:
    e6:d7:88:02
./dsatest -app2_1
test generation of DSA parameters
.++++++++++++++++++++++++++++++++++++++++++++++++++*
...+........+..+...+............+.+..+..........................................................................+++++++++++++++++++++++++++++++++++++++++++++++++++*
seed
D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3 
counter=105 h=2
P:   
    00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68:
    69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d:
    78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac:
    32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36:
    ee:31:c8:02:91
Q:   
    00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30:
    f4:8e:da:ce:91:5f
G:   
    62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5:
    00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce:
    2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21:
    92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53:
    e6:d7:88:02
Generate and certify a test certificate

make a certificate request using 'req'
rsa
Using configuration from CAss.cnf
Generating a 512 bit RSA private key
..........++++++++++++
.........++++++++++++
writing new private key to 'keyCA.ss'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Dodgy CA

convert the certificate request into a self signed certificate using 'x509'
unable to load 'random state'
This means that the random number generator has not been seeded
with much random data.
Consider setting the RANDFILE environment variable to point at a file that
'random' data can be kept in (the file will be overwritten).
Signature ok
subject=/C=AU/O=Dodgy Brothers/CN=Dodgy CA
Getting Private key

convert a certificate into a certificate request using 'x509'
unable to load 'random state'
This means that the random number generator has not been seeded
with much random data.
Consider setting the RANDFILE environment variable to point at a file that
'random' data can be kept in (the file will be overwritten).
Getting request Private Key
Generating certificate request
Using configuration from ../apps/openssl.cnf
verify OK
Using configuration from ../apps/openssl.cnf
verify OK
certCA.ss: OK

make another certificate request using 'req'
Using configuration from Uss.cnf
Generating a 512 bit RSA private key
...++++++++++++
.................++++++++++++
writing new private key to 'keyU.ss'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Brother 1
Common Name (eg, YOUR name) []:Brother 2

sign certificate request with the just created CA via 'x509'
unable to load 'random state'
This means that the random number generator has not been seeded
with much random data.
Consider setting the RANDFILE environment variable to point at a file that
'random' data can be kept in (the file will be overwritten).
Signature ok
subject=/C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
Getting CA Private Key
certU.ss: OK

Certificate details
subject= /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
issuer= /C=AU/O=Dodgy Brothers/CN=Dodgy CA
notBefore=Oct 23 12:29:16 2000 GMT
notAfter=Nov 22 12:29:16 2000 GMT

The generated CA certificate is certCA.ss
The generated CA private key is keyCA.ss
The generated user certificate is certU.ss
The generated user private key is keyU.ss
rsa
Generate and certify a test certificate via the 'ca' program
CA certificate filename (or enter to create)
Making CA certificate ...
Using configuration from CAss.cnf
Generating a 512 bit RSA private key
...++++++++++++
.++++++++++++
writing new private key to './demoCA/private/./cakey.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Dodgy CA
Using configuration from Uss.cnf
Generating a 512 bit RSA private key
.....++++++++++++
...............++++++++++++
writing new private key to 'newreq.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Brother 1
Common Name (eg, YOUR name) []:Brother 2
Request (and private key) is in newreq.pem
Using configuration from ../apps/openssl.cnf
unable to load 'random state'
This means that the random number generator has not been seeded
with much random data.
Check that the request matches the signature
Signature ok
The Subjects Distinguished Name is as follows
countryName           :PRINTABLE:'AU'
organizationName      :PRINTABLE:'Dodgy Brothers'
commonName            :PRINTABLE:'Brother 1'
commonName            :PRINTABLE:'Brother 2'
Certificate is to be certified until Oct 23 12:29:19 2001 GMT (365 days)
Sign the certificate? [y/n]:

1 out of 1 certificate requests certified, commit? [y/n]Write out database with 1 new 
entries
Data Base Updated
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: md5WithRSAEncryption
        Issuer: C=AU, O=Dodgy Brothers, CN=Dodgy CA
        Validity
            Not Before: Oct 23 12:29:19 2000 GMT
            Not After : Oct 23 12:29:19 2001 GMT
        Subject: C=AU, O=Dodgy Brothers, CN=Brother 1, CN=Brother 2
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
            RSA Public Key: (512 bit)
                Modulus (512 bit):
                    00:b8:c1:13:e0:72:1e:f7:f9:b6:06:16:ba:46:ff:
                    18:8a:5e:c2:5f:9f:0b:75:82:a9:ea:d0:25:0b:db:
                    4e:2f:a1:7b:0b:0d:28:17:1a:e4:5b:73:60:c5:f7:
                    cb:e6:a7:03:f1:97:52:52:54:c5:8b:7c:4f:78:9f:
                    44:dc:df:29:51
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Basic Constraints: 
                CA:FALSE
            Netscape Comment: 
                OpenSSL Generated Certificate
            X509v3 Subject Key Identifier: 
                D0:A8:3D:32:47:4F:DF:2B:C3:CA:EC:35:65:86:E4:C3:9E:31:0B:AE
            X509v3 Authority Key Identifier: 
                DirName:/C=AU/O=Dodgy Brothers/CN=Dodgy CA
                serial:00

    Signature Algorithm: md5WithRSAEncryption
        4b:31:18:1b:9b:35:50:57:87:26:14:3e:f3:26:32:32:4d:6b:
        9a:bf:f8:b5:e8:16:49:9e:19:45:06:ef:00:b6:bb:c5:83:cf:
        a7:6f:d2:eb:4a:c6:62:ce:60:b5:6b:71:5e:6f:97:d1:c3:29:
        dc:e7:12:44:fb:0e:c6:07:e3:bb
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Signed certificate is in newcert.pem
newcert.pem: OK
test SSL protocol
test sslv2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with client authentication
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with both client and server authentication
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv3
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with client authentication
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with both client and server authentication
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with client authentication
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with both client and server authentication
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2 via BIO pair
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with server authentication via BIO pair
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with client authentication via BIO pair
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with both client and server authentication via BIO pair
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv3 via BIO pair
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with server authentication via BIO pair
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with client authentication via BIO pair
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with both client and server authentication via BIO pair
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 via BIO pair
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 w/o DHE via BIO pair
TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with 1024bit DHE via BIO pair
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with client authentication via BIO pair
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with both client and server authentication via BIO pair
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test tls1 with 1024bit anonymous DH, multiple handshakes
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
10 handshakes of 1 bytes done
Approximate total server time:   0.98 s
Approximate total client time:   5.32 s
rsa
test tls1 with 1024bit RSA, no DHE, multiple handshakes
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
10 handshakes of 1 bytes done
Approximate total server time:   0.90 s
Approximate total client time:   0.80 s
test tls1 with 1024bit RSA, 1024bit DHE, multiple handshakes
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
10 handshakes of 1 bytes done
Approximate total server time:   1.79 s
Approximate total client time:   5.50 s
OpenSSL 0.9.6 24 Sep 2000
built on: Mon Oct 23 13:56:50 MET DST 2000
platform: solaris-sparcv9-gcc
options:  bn(64,32) md2(int) rc4(ptr,char) des(idx,cisc,16,long) idea(int) 
blowfish(ptr) 
compiler: gcc -fPIC -DTHREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -mcpu=ultrasparc 
-O3 -fomit-frame-pointer -Wall -DB_ENDIAN -DBN_DIV2W -DULTRASPARC -DMD5_ASM
`test' is up to date.
Checking compiler...
Running make...
Running make test...

OpenSSL self-test report:

OpenSSL version:  0.9.6
Last change:      In ssl23_get_client_hello, generate an error message wh...
OS (uname):       SunOS ultra.cto.us.edu.pl 5.6 Generic_105181-23 sun4u sparc 
SUNW,Ultra-Enterprise
OS (config):      sun4u-whatever-solaris2
Target (default): ??
Target:           solaris-sparcv9-gcc
Compiler:         gcc version 2.8.1

Test passed.

Test report in file testlog
OpenSSL self-test report:

OpenSSL version:  0.9.6
Last change:      In ssl23_get_client_hello, generate an error message wh...
OS (uname):       SunOS ultra.cto.us.edu.pl 5.6 Generic_105181-23 sun4u sparc 
SUNW,Ultra-Enterprise
OS (config):      sun4u-whatever-solaris2
Target (default): ??
Target:           solaris-sparcv9-gcc
Compiler:         gcc version 2.8.1

Test passed.

Reply via email to