Error build under NT 4, VC6 cl /Fotmp32dll\rand_win.obj -Iinc32 -Itmp32dll /MD /W3 /WX /G5 /Ox /O2 /Ob2 /Gs0 /GF /Gy /nologo -DWIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DBN_ASM -DMD 5_ASM -DSHA1_ASM -DRMD160_ASM /Fdout32dll /GD -D_WINDLL -D_DLL -c .\crypto\rand \rand_win.c rand_win.c .\crypto\rand\rand_win.c(175) : error C2143: syntax error : missing ')' before ' *' .\crypto\rand\rand_win.c(175) : error C2143: syntax error : missing '{' before ' *' .\crypto\rand\rand_win.c(175) : error C2059: syntax error : ')' .\crypto\rand\rand_win.c(175) : error C2059: syntax error : ';' .\crypto\rand\rand_win.c(190) : error C2065: 'NETSTATGET' : undeclared identifie r .\crypto\rand\rand_win.c(190) : error C2146: syntax error : missing ';' before i dentifier 'netstatget' .\crypto\rand\rand_win.c(190) : error C2065: 'netstatget' : undeclared identifie r .\crypto\rand\rand_win.c(191) : error C2275: 'NETFREE' : illegal use of this typ e as an expression .\crypto\rand\rand_win.c(176) : see declaration of 'NETFREE' .\crypto\rand\rand_win.c(191) : error C2146: syntax error : missing ';' before i dentifier 'netfree' .\crypto\rand\rand_win.c(191) : error C2065: 'netfree' : undeclared identifier .\crypto\rand\rand_win.c(201) : error C2146: syntax error : missing ';' before i dentifier 'GetProcAddress' .\crypto\rand\rand_win.c(202) : warning C4047: '=' : 'int ' differs in levels of indirection from 'unsigned long (__stdcall *)(unsigned char *)' .\crypto\rand\rand_win.c(209) : error C2063: 'netstatget' : not a function .\crypto\rand\rand_win.c(212) : error C2063: 'netfree' : not a function .\crypto\rand\rand_win.c(214) : error C2063: 'netstatget' : not a function .\crypto\rand\rand_win.c(217) : error C2063: 'netfree' : not a function NMAKE : fatal error U1077: 'cl' : return code '0x2' Stop. ========== mingw32 gcc -o tmp/rand_win.o -Ioutinc -Itmp -DL_ENDIAN -fomit-frame-pointer -O3 -m486 -Wall -DBN_ASM -DMD5_ASM -DSHA1_ASM -c ./crypto/rand/rand_win.c ./crypto/rand/rand_win.c:175: parse error before `DWORD' ./crypto/rand/rand_win.c: In function `RAND_poll': ./crypto/rand/rand_win.c:187: warning: `acquire' might be used uninitialized in this function ./crypto/rand/rand_win.c:188: warning: `gen' might be used uninitialized in this function ./crypto/rand/rand_win.c:189: warning: `release' might be used uninitialized in this function ./crypto/rand/rand_win.c:190: warning: `netstatget' might be used uninitialized in this function ./crypto/rand/rand_win.c:191: warning: `netfree' might be used uninitialized in this function ./crypto/rand/rand_win.c: In function `readtimer': ./crypto/rand/rand_win.c:505: warning: unused variable `cyclecount' make: *** [tmp/rand_win.o] Error 1 ========== CYGWIN build with cygwin successful but the test fail at some places. It should be due to the test cases write to file in text mode and the original file is from UNIX, so the output is different by end of line [cr lf] and [lf]. Othewise it should be a consider OK. Attached is the full test of cygwin build. -- (~._.~) Öì Ⱥ Ó¢ (Qun-Ying) (65) 874-6743 ( O ) TrustCopy Pte Ltd / Kent Ridge Digital Labs ()~*~() 21 Heng Mui Keng Terrace, Singapore 119613 (_)-(_) [EMAIL PROTECTED] * [EMAIL PROTECTED]
testing... make[1]: Entering directory `/d/src/openssl-0.9.6-beta2/test' make[2]: Entering directory `/d/src/openssl-0.9.6-beta2/apps' make[2]: Nothing to be done for `all'. make[2]: Leaving directory `/d/src/openssl-0.9.6-beta2/apps' ./destest Doing cbcm Doing ecb Doing ede ecb Doing cbc Doing desx cbc Doing ede cbc Doing pcbc Doing cfb8 cfb16 cfb32 cfb48 cfb64 cfb64() ede_cfb64() done Doing ofb Doing ofb64 Doing ede_ofb64 Doing cbc_cksum Doing quad_cksum input word alignment test 0 1 2 3 output word alignment test 0 1 2 3 fast crypt test ./ideatest ecb idea ok cbc idea ok cfb64 idea ok ./shatest test 1 ok test 2 ok test 3 ok ./sha1test test 1 ok test 2 ok test 3 ok ./md4test test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test 6 ok test 7 ok ./md5test test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test 6 ok test 7 ok ./hmactest test 0 ok test 1 ok test 2 ok test 3 ok ./md2test test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test 6 ok test 7 ok ./mdc2test pad1 - ok pad2 - ok ./rmdtest test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test 6 ok test 7 ok test 8 ok ./rc2test ecb RC2 ok ./rc4test test 0 ok test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test end processing ....................done test multi-call ....................done ./rc5test ecb RC5 ok cbc RC5 ok ./bftest testing blowfish in raw ecb mode testing blowfish in ecb mode testing blowfish set_key testing blowfish in cbc mode testing blowfish in cfb64 mode testing blowfish in ofb64 ./casttest ecb cast5 ok This test will take some time....123456789ABCDEF ok ./randtest test 1 done test 2 done test 3 done test 4 done starting big number library test, could take a while... test BN_add test BN_sub test BN_lshift1 test BN_lshift (fixed) test BN_lshift test BN_rshift1 test BN_rshift test BN_sqr test BN_mul test BN_div test BN_div_recp test BN_mod test BN_mod_mul test BN_mont test BN_mod_exp test BN_exp running bc bc: not found bc: not found tests passed test a^b%c implementations ./exptest ........................................................................................................................................................................................................ done cat ./p ./p.clear differ: char 2, line 1 make[1]: [test_enc] Error 1 (ignored) echo test normal x509v1 certificate test normal x509v1 certificate sh ./tx509 2>/dev/null testing X509 conversions p -> d p -> n p -> p d -> d n -> d p -> d d -> n n -> n p -> n d -> p n -> p p -> p fff.p f.p differ: char 28, line 1 make[1]: [test_x509] Error 1 (ignored) echo test first x509v3 certificate test first x509v3 certificate sh ./tx509 v3-cert1.pem 2>/dev/null testing X509 conversions p -> d p -> n p -> p d -> d n -> d p -> d d -> n n -> n p -> n d -> p n -> p p -> p fff.p f.p differ: char 28, line 1 make[1]: [test_x509] Error 1 (ignored) echo test second x509v3 certificate test second x509v3 certificate sh ./tx509 v3-cert2.pem 2>/dev/null testing X509 conversions p -> d p -> n p -> p d -> d n -> d p -> d d -> n n -> n p -> n d -> p n -> p p -> p fff.p f.p differ: char 28, line 1 make[1]: [test_x509] Error 1 (ignored) rsa testing rsa conversions p -> d p -> p d -> d p -> d d -> p p -> p fff.p f.p differ: char 32, line 1 make[1]: [test_rsa] Error 1 (ignored) ./rsa_test PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok testing crl conversions p -> d p -> p d -> d p -> d d -> p p -> p fff.p f.p differ: char 25, line 1 make[1]: [test_crl] Error 1 (ignored) testing session-id conversions p -> d p -> p d -> d p -> d d -> p p -> p fff.p f.p differ: char 39, line 1 make[1]: [test_sid] Error 1 (ignored) Generate and verify a certificate request generating certificate request rsa There should be a 2 sequences of .'s and some +'s. There should not be more that at most 80 per line This could take some time. Using configuration from test.cnf Generating a 512 bit RSA private key ....++++++++++++ .........++++++++++++ writing new private key to 'testkey.pem' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU State or Province Name (full name) [Queensland]: Locality Name (eg, city) []:Brisbane Organization Name (eg, company) []:CryptSoft Pty Ltd Organizational Unit Name (eg, section) []:. Common Name (eg, YOUR name) []:Eric Young Email Address []:[EMAIL PROTECTED] Using configuration from test.cnf verify OK testing req conversions p -> d p -> p d -> d p -> d d -> p p -> p testing req conversions p -> d p -> p d -> d p -> d d -> p p -> p fff.p f.p differ: char 36, line 1 make[1]: [test_req] Error 1 (ignored) testing pkcs7 conversions p -> d p -> p d -> d p -> d d -> p p -> p fff.p f.p differ: char 22, line 1 make[1]: [test_pkcs7] Error 1 (ignored) testing pkcs7 conversions (2) p -> d p -> p d -> d p -> d d -> p p -> p The following command should have some OK's and some failures There are definitly a few expired certificates ../apps/openssl verify -CApath ../certs ../certs/*.pem ../certs/ICE-CA.pem: /O=European ICE-TEL project/OU=V3-Certification Authority error 10 at 1 depth lookup:Certificate has expired /O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt error 10 at 0 depth lookup:Certificate has expired OK ../certs/ICE-root.pem: /O=European ICE-TEL project/OU=V3-Certification Authority error 10 at 0 depth lookup:Certificate has expired OK ../certs/ICE-user.pem: /O=European ICE-TEL project/OU=V3-Certification Authority error 10 at 2 depth lookup:Certificate has expired /O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt error 10 at 1 depth lookup:Certificate has expired /O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt/CN=USER error 10 at 0 depth lookup:Certificate has expired OK ../certs/ca-cert.pem: OK ../certs/dsa-ca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=PCA error 10 at 1 depth lookup:Certificate has expired /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=CA error 10 at 0 depth lookup:Certificate has expired OK ../certs/dsa-pca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=PCA error 10 at 0 depth lookup:Certificate has expired OK ../certs/factory.pem: /C=GB/O=UCL/OU=ICE-TEL Project/CN=TrustFactory error 10 at 0 depth lookup:Certificate has expired OK ../certs/nortelCA.pem: OK ../certs/pca-cert.pem: OK ../certs/rsa-cca.pem: /C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority error 10 at 0 depth lookup:Certificate has expired OK ../certs/rsa-ssca.pem: /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority error 18 at 0 depth lookup:self signed certificate /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority error 10 at 0 depth lookup:Certificate has expired OK ../certs/thawteCb.pem: OK ../certs/thawteCp.pem: OK ../certs/timCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty Ltd/OU=development/CN=CryptSoft Dev CA error 10 at 0 depth lookup:Certificate has expired OK ../certs/tjhCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty Ltd/OU=WORTHLESS CERTIFICATION AUTHORITIES/CN=ZERO VALUE CA - DEMONSTRATION PURPOSES ONLY error 10 at 0 depth lookup:Certificate has expired OK ../certs/vsign1.pem: OK ../certs/vsign2.pem: OK ../certs/vsign3.pem: OK ../certs/vsignss.pem: OK ../certs/vsigntca.pem: OK Generate a set of DH parameters ./dhtest ......+......++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++* p =90DDD747FF888EDB g =5 pri 1=67E066BF53E0F0AE pub 1=316D8EA0BD631016 pri 2=5500419E66489E3E pub 2=43D60713BA052476 key1 =8A30063472700D23 key2 =8A30063472700D23 Generate a set of DSA parameters ./dsatest test generation of DSA parameters .++++++++++++++++++++++++++++++++++++++++++++++++++* ...+........+..+...+............+.+..+..........................................................................+++++++++++++++++++++++++++++++++++++++++++++++++++* seed D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3 counter=105 h=2 P: 00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68: 69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d: 78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac: 32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36: ee:31:c8:02:91 Q: 00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30: f4:8e:da:ce:91:5f G: 62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5: 00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce: 2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21: 92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53: e6:d7:88:02 ./dsatest -app2_1 test generation of DSA parameters .++++++++++++++++++++++++++++++++++++++++++++++++++* ...+........+..+...+............+.+..+..........................................................................+++++++++++++++++++++++++++++++++++++++++++++++++++* seed D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3 counter=105 h=2 P: 00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68: 69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d: 78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac: 32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36: ee:31:c8:02:91 Q: 00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30: f4:8e:da:ce:91:5f G: 62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5: 00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce: 2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21: 92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53: e6:d7:88:02 Generate and certify a test certificate make a certificate request using 'req' rsa Using configuration from CAss.cnf Generating a 512 bit RSA private key ..++++++++++++ ............++++++++++++ writing new private key to 'keyCA.ss' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU Organization Name (eg, company) []:Dodgy Brothers Common Name (eg, YOUR name) []:Dodgy CA convert the certificate request into a self signed certificate using 'x509' Signature ok subject=/C=AU/O=Dodgy Brothers/CN=Dodgy CA Getting Private key convert a certificate into a certificate request using 'x509' Getting request Private Key Generating certificate request Using configuration from ../apps/openssl.cnf verify OK Using configuration from ../apps/openssl.cnf verify OK certCA.ss: OK make another certificate request using 'req' Using configuration from Uss.cnf Generating a 512 bit RSA private key .......................++++++++++++ ..........++++++++++++ writing new private key to 'keyU.ss' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU Organization Name (eg, company) []:Dodgy Brothers Common Name (eg, YOUR name) []:Brother 1 Common Name (eg, YOUR name) []:Brother 2 sign certificate request with the just created CA via 'x509' Signature ok subject=/C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 Getting CA Private Key certU.ss: OK Certificate details subject= /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 issuer= /C=AU/O=Dodgy Brothers/CN=Dodgy CA notBefore=Sep 18 02:26:46 2000 GMT notAfter=Oct 18 02:26:46 2000 GMT The generated CA certificate is certCA.ss The generated CA private key is keyCA.ss The generated user certificate is certU.ss The generated user private key is keyU.ss rsa Generate and certify a test certificate via the 'ca' program CA certificate filename (or enter to create) Making CA certificate ... Using configuration from CAss.cnf Generating a 512 bit RSA private key ....++++++++++++ .++++++++++++ writing new private key to './demoCA/private/./cakey.pem' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU Organization Name (eg, company) []:Dodgy Brothers Common Name (eg, YOUR name) []:Dodgy CA Using configuration from Uss.cnf Generating a 512 bit RSA private key ..........................++++++++++++ ......++++++++++++ writing new private key to 'newreq.pem' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU Organization Name (eg, company) []:Dodgy Brothers Common Name (eg, YOUR name) []:Brother 1 Common Name (eg, YOUR name) []:Brother 2 Request (and private key) is in newreq.pem Using configuration from ../apps/openssl.cnf Check that the request matches the signature Signature ok The Subjects Distinguished Name is as follows countryName :PRINTABLE:'AU' organizationName :PRINTABLE:'Dodgy Brothers' commonName :PRINTABLE:'Brother 1' commonName :PRINTABLE:'Brother 2' Certificate is to be certified until Sep 18 02:26:51 2001 GMT (365 days) Sign the certificate? [y/n]: 1 out of 1 certificate requests certified, commit? [y/n]Write out database with 1 new entries Data Base Updated Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: md5WithRSAEncryption Issuer: C=AU, O=Dodgy Brothers, CN=Dodgy CA Validity Not Before: Sep 18 02:26:51 2000 GMT Not After : Sep 18 02:26:51 2001 GMT Subject: C=AU, O=Dodgy Brothers, CN=Brother 1, CN=Brother 2 Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (512 bit) Modulus (512 bit): 00:e2:61:fd:5d:b8:cb:a9:dd:f0:0e:72:c2:c7:3b: 54:d3:97:cc:c4:c4:bb:c9:dd:83:c8:6b:8e:25:9f: e4:95:d6:36:8d:45:89:45:56:e1:a2:f6:d1:9d:9d: 99:d4:b9:e2:ac:aa:93:ad:09:72:e0:65:d3:77:eb: d3:b1:55:55:1f Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Comment: OpenSSL Generated Certificate X509v3 Subject Key Identifier: 47:27:70:04:1C:B0:5A:8C:B7:33:8F:33:E3:6D:7A:D4:3B:4F:91:40 X509v3 Authority Key Identifier: DirName:/C=AU/O=Dodgy Brothers/CN=Dodgy CA serial:00 Signature Algorithm: md5WithRSAEncryption 02:39:fc:a7:fd:81:6d:07:1f:c0:e9:b0:56:10:a2:33:6c:98: 2f:81:f1:2e:d9:37:04:bb:2c:12:9f:6a:d7:d5:3d:6d:ca:01: 12:c4:a9:20:43:03:6f:8d:a1:fe:dd:02:33:72:a4:5a:81:d5: 87:8f:25:48:7a:25:2d:28:cd:af -----BEGIN CERTIFICATE----- MIICITCCAcugAwIBAgIBATANBgkqhkiG9w0BAQQFADA5MQswCQYDVQQGEwJBVTEX MBUGA1UEChMORG9kZ3kgQnJvdGhlcnMxETAPBgNVBAMTCERvZGd5IENBMB4XDTAw MDkxODAyMjY1MVoXDTAxMDkxODAyMjY1MVowTjELMAkGA1UEBhMCQVUxFzAVBgNV BAoTDkRvZGd5IEJyb3RoZXJzMRIwEAYDVQQDEwlCcm90aGVyIDExEjAQBgNVBAMT CUJyb3RoZXIgMjBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQDiYf1duMup3fAOcsLH O1TTl8zExLvJ3YPIa44ln+SV1jaNRYlFVuGi9tGdnZnUueKsqpOtCXLgZdN369Ox VVUfAgMBAAGjgagwgaUwCQYDVR0TBAIwADAsBglghkgBhvhCAQ0EHxYdT3BlblNT TCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFEcncAQcsFqMtzOPM+Nt etQ7T5FAMEsGA1UdIwREMEKhPaQ7MDkxCzAJBgNVBAYTAkFVMRcwFQYDVQQKEw5E b2RneSBCcm90aGVyczERMA8GA1UEAxMIRG9kZ3kgQ0GCAQAwDQYJKoZIhvcNAQEE BQADQQACOfyn/YFtBx/A6bBWEKIzbJgvgfEu2TcEuywSn2rX1T1tygESxKkgQwNv jaH+3QIzcqRagdWHjyVIeiUtKM2v -----END CERTIFICATE----- Signed certificate is in newcert.pem newcert.pem: OK test SSL protocol test sslv2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with server authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with client authentication client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with both client and server authentication client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv3 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with server authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with client authentication client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with both client and server authentication client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with server authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with client authentication client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with both client and server authentication client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2 via BIO pair SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with server authentication via BIO pair server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with client authentication via BIO pair client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with both client and server authentication via BIO pair client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv3 via BIO pair SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with server authentication via BIO pair server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with client authentication via BIO pair client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with both client and server authentication via BIO pair client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 via BIO pair TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 w/o DHE via BIO pair TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with 1024bit DHE via BIO pair DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with server authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with client authentication via BIO pair client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with both client and server authentication via BIO pair client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test tls1 with 1024bit anonymous DH, multiple handshakes DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA 10 handshakes of 1 bytes done Approximate total server time: 0.30 s Approximate total client time: 1.69 s rsa test tls1 with 1024bit RSA, no DHE, multiple handshakes DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA 10 handshakes of 1 bytes done Approximate total server time: 0.29 s Approximate total client time: 0.60 s test tls1 with 1024bit RSA, 1024bit DHE, multiple handshakes DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA 10 handshakes of 1 bytes done Approximate total server time: 0.58 s Approximate total client time: 1.70 s make[1]: Leaving directory `/d/src/openssl-0.9.6-beta2/test' OpenSSL 0.9.6-beta2 17 Sep 2000 built on: Mon Sep 18 10:14:53 2000 platform: CygWin32 options: bn(64,32) md2(int) rc4(idx,int) des(ptr,risc1,16,long) idea(int) blowfish(idx) compiler: gcc -DDSO_WIN32 -DTERMIOS -DL_ENDIAN -fomit-frame-pointer -O3 -m486 -Wall