Error build under NT 4, VC6

        cl /Fotmp32dll\rand_win.obj  -Iinc32 -Itmp32dll /MD /W3 /WX /G5 /Ox /O2
/Ob2 /Gs0 /GF /Gy /nologo -DWIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DBN_ASM -DMD
5_ASM -DSHA1_ASM -DRMD160_ASM /Fdout32dll /GD -D_WINDLL -D_DLL  -c .\crypto\rand
\rand_win.c
rand_win.c
.\crypto\rand\rand_win.c(175) : error C2143: syntax error : missing ')' before '
*'
.\crypto\rand\rand_win.c(175) : error C2143: syntax error : missing '{' before '
*'
.\crypto\rand\rand_win.c(175) : error C2059: syntax error : ')'
.\crypto\rand\rand_win.c(175) : error C2059: syntax error : ';'
.\crypto\rand\rand_win.c(190) : error C2065: 'NETSTATGET' : undeclared identifie
r
.\crypto\rand\rand_win.c(190) : error C2146: syntax error : missing ';' before i
dentifier 'netstatget'
.\crypto\rand\rand_win.c(190) : error C2065: 'netstatget' : undeclared identifie
r
.\crypto\rand\rand_win.c(191) : error C2275: 'NETFREE' : illegal use of this typ
e as an expression
        .\crypto\rand\rand_win.c(176) : see declaration of 'NETFREE'
.\crypto\rand\rand_win.c(191) : error C2146: syntax error : missing ';' before i
dentifier 'netfree'
.\crypto\rand\rand_win.c(191) : error C2065: 'netfree' : undeclared identifier
.\crypto\rand\rand_win.c(201) : error C2146: syntax error : missing ';' before i
dentifier 'GetProcAddress'
.\crypto\rand\rand_win.c(202) : warning C4047: '=' : 'int ' differs in levels of
 indirection from 'unsigned long (__stdcall *)(unsigned char *)'
.\crypto\rand\rand_win.c(209) : error C2063: 'netstatget' : not a function
.\crypto\rand\rand_win.c(212) : error C2063: 'netfree' : not a function
.\crypto\rand\rand_win.c(214) : error C2063: 'netstatget' : not a function
.\crypto\rand\rand_win.c(217) : error C2063: 'netfree' : not a function
NMAKE : fatal error U1077: 'cl' : return code '0x2'
Stop.

========== mingw32
gcc -o tmp/rand_win.o  -Ioutinc -Itmp -DL_ENDIAN -fomit-frame-pointer -O3 -m486
-Wall -DBN_ASM -DMD5_ASM -DSHA1_ASM  -c ./crypto/rand/rand_win.c
./crypto/rand/rand_win.c:175: parse error before `DWORD'
./crypto/rand/rand_win.c: In function `RAND_poll':
./crypto/rand/rand_win.c:187: warning: `acquire' might be used uninitialized in
this function
./crypto/rand/rand_win.c:188: warning: `gen' might be used uninitialized in this
 function
./crypto/rand/rand_win.c:189: warning: `release' might be used uninitialized in
this function
./crypto/rand/rand_win.c:190: warning: `netstatget' might be used uninitialized
in this function
./crypto/rand/rand_win.c:191: warning: `netfree' might be used uninitialized in
this function
./crypto/rand/rand_win.c: In function `readtimer':
./crypto/rand/rand_win.c:505: warning: unused variable `cyclecount'
make: *** [tmp/rand_win.o] Error 1

========== CYGWIN
build with cygwin successful but the test fail at some places. It should be due
to the test cases write to file in text mode and the original file is from UNIX,
so the output is different by end of line [cr lf] and [lf]. Othewise it should
be a consider OK.

Attached is the full test of cygwin build.

-- 
(~._.~)  Öì Ⱥ Ó¢  (Qun-Ying)          (65) 874-6743
 ( O )   TrustCopy Pte Ltd / Kent Ridge Digital Labs
()~*~()  21 Heng Mui Keng Terrace,  Singapore 119613
(_)-(_)    [EMAIL PROTECTED]  *  [EMAIL PROTECTED]
testing...
make[1]: Entering directory `/d/src/openssl-0.9.6-beta2/test'
make[2]: Entering directory `/d/src/openssl-0.9.6-beta2/apps'
make[2]: Nothing to be done for `all'.
make[2]: Leaving directory `/d/src/openssl-0.9.6-beta2/apps'
./destest
Doing cbcm
Doing ecb
Doing ede ecb
Doing cbc
Doing desx cbc
Doing ede cbc
Doing pcbc
Doing cfb8 cfb16 cfb32 cfb48 cfb64 cfb64() ede_cfb64() done
Doing ofb
Doing ofb64
Doing ede_ofb64
Doing cbc_cksum
Doing quad_cksum
input word alignment test 0 1 2 3
output word alignment test 0 1 2 3
fast crypt test 
./ideatest
ecb idea ok
cbc idea ok
cfb64 idea ok
./shatest
test 1 ok
test 2 ok
test 3 ok
./sha1test
test 1 ok
test 2 ok
test 3 ok
./md4test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./md5test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./hmactest
test 0 ok
test 1 ok
test 2 ok
test 3 ok
./md2test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./mdc2test
pad1 - ok
pad2 - ok
./rmdtest
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
test 8 ok
./rc2test
ecb RC2 ok
./rc4test
test 0 ok
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test end processing ....................done
test multi-call ....................done
./rc5test
ecb RC5 ok
cbc RC5 ok
./bftest
testing blowfish in raw ecb mode
testing blowfish in ecb mode
testing blowfish set_key
testing blowfish in cbc mode
testing blowfish in cfb64 mode
testing blowfish in ofb64
./casttest
ecb cast5 ok
This test will take some time....123456789ABCDEF ok
./randtest
test 1 done
test 2 done
test 3 done
test 4 done
starting big number library test, could take a while...
test BN_add
test BN_sub
test BN_lshift1
test BN_lshift (fixed)
test BN_lshift
test BN_rshift1
test BN_rshift
test BN_sqr
test BN_mul
test BN_div
test BN_div_recp
test BN_mod
test BN_mod_mul
test BN_mont
test BN_mod_exp
test BN_exp
running bc
bc: not found
bc: not found

 tests passed
test a^b%c implementations
./exptest
........................................................................................................................................................................................................
 done
cat
./p ./p.clear differ: char 2, line 1
make[1]: [test_enc] Error 1 (ignored)
echo test normal x509v1 certificate
test normal x509v1 certificate
sh ./tx509 2>/dev/null
testing X509 conversions
p -> d
p -> n
p -> p
d -> d
n -> d
p -> d
d -> n
n -> n
p -> n
d -> p
n -> p
p -> p
fff.p f.p differ: char 28, line 1
make[1]: [test_x509] Error 1 (ignored)
echo test first x509v3 certificate
test first x509v3 certificate
sh ./tx509 v3-cert1.pem 2>/dev/null
testing X509 conversions
p -> d
p -> n
p -> p
d -> d
n -> d
p -> d
d -> n
n -> n
p -> n
d -> p
n -> p
p -> p
fff.p f.p differ: char 28, line 1
make[1]: [test_x509] Error 1 (ignored)
echo test second x509v3 certificate
test second x509v3 certificate
sh ./tx509 v3-cert2.pem 2>/dev/null
testing X509 conversions
p -> d
p -> n
p -> p
d -> d
n -> d
p -> d
d -> n
n -> n
p -> n
d -> p
n -> p
p -> p
fff.p f.p differ: char 28, line 1
make[1]: [test_x509] Error 1 (ignored)
rsa
testing rsa conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
fff.p f.p differ: char 32, line 1
make[1]: [test_rsa] Error 1 (ignored)
./rsa_test
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
testing crl conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
fff.p f.p differ: char 25, line 1
make[1]: [test_crl] Error 1 (ignored)
testing session-id conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
fff.p f.p differ: char 39, line 1
make[1]: [test_sid] Error 1 (ignored)
Generate and verify a certificate request
generating certificate request
rsa
There should be a 2 sequences of .'s and some +'s.
There should not be more that at most 80 per line
This could take some time.
Using configuration from test.cnf
Generating a 512 bit RSA private key
....++++++++++++
.........++++++++++++
writing new private key to 'testkey.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
State or Province Name (full name) [Queensland]:
Locality Name (eg, city) []:Brisbane
Organization Name (eg, company) []:CryptSoft Pty Ltd
Organizational Unit Name (eg, section) []:.
Common Name (eg, YOUR name) []:Eric Young
Email Address []:[EMAIL PROTECTED]
Using configuration from test.cnf
verify OK
testing req conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
testing req conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
fff.p f.p differ: char 36, line 1
make[1]: [test_req] Error 1 (ignored)
testing pkcs7 conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
fff.p f.p differ: char 22, line 1
make[1]: [test_pkcs7] Error 1 (ignored)
testing pkcs7 conversions (2)
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
The following command should have some OK's and some failures
There are definitly a few expired certificates
../apps/openssl verify -CApath ../certs ../certs/*.pem
../certs/ICE-CA.pem: /O=European ICE-TEL project/OU=V3-Certification Authority
error 10 at 1 depth lookup:Certificate has expired
/O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/ICE-root.pem: /O=European ICE-TEL project/OU=V3-Certification Authority
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/ICE-user.pem: /O=European ICE-TEL project/OU=V3-Certification Authority
error 10 at 2 depth lookup:Certificate has expired
/O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt
error 10 at 1 depth lookup:Certificate has expired
/O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt/CN=USER
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/ca-cert.pem: OK
../certs/dsa-ca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=PCA
error 10 at 1 depth lookup:Certificate has expired
/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=CA
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/dsa-pca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=PCA
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/factory.pem: /C=GB/O=UCL/OU=ICE-TEL Project/CN=TrustFactory
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/nortelCA.pem: OK
../certs/pca-cert.pem: OK
../certs/rsa-cca.pem: /C=US/O=RSA Data Security, Inc./OU=Commercial Certification 
Authority
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/rsa-ssca.pem: /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification 
Authority
error 18 at 0 depth lookup:self signed certificate
/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/thawteCb.pem: OK
../certs/thawteCp.pem: OK
../certs/timCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty 
Ltd/OU=development/CN=CryptSoft Dev CA
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/tjhCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty Ltd/OU=WORTHLESS 
CERTIFICATION AUTHORITIES/CN=ZERO VALUE CA - DEMONSTRATION PURPOSES ONLY
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/vsign1.pem: OK
../certs/vsign2.pem: OK
../certs/vsign3.pem: OK
../certs/vsignss.pem: OK
../certs/vsigntca.pem: OK
Generate a set of DH parameters
./dhtest
......+......++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*

p    =90DDD747FF888EDB
g    =5
pri 1=67E066BF53E0F0AE
pub 1=316D8EA0BD631016
pri 2=5500419E66489E3E
pub 2=43D60713BA052476
key1 =8A30063472700D23
key2 =8A30063472700D23
Generate a set of DSA parameters
./dsatest
test generation of DSA parameters
.++++++++++++++++++++++++++++++++++++++++++++++++++*
...+........+..+...+............+.+..+..........................................................................+++++++++++++++++++++++++++++++++++++++++++++++++++*
seed
D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3 
counter=105 h=2
P:   
    00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68:
    69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d:
    78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac:
    32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36:
    ee:31:c8:02:91
Q:   
    00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30:
    f4:8e:da:ce:91:5f
G:   
    62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5:
    00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce:
    2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21:
    92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53:
    e6:d7:88:02
./dsatest -app2_1
test generation of DSA parameters
.++++++++++++++++++++++++++++++++++++++++++++++++++*
...+........+..+...+............+.+..+..........................................................................+++++++++++++++++++++++++++++++++++++++++++++++++++*
seed
D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3 
counter=105 h=2
P:   
    00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68:
    69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d:
    78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac:
    32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36:
    ee:31:c8:02:91
Q:   
    00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30:
    f4:8e:da:ce:91:5f
G:   
    62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5:
    00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce:
    2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21:
    92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53:
    e6:d7:88:02
Generate and certify a test certificate

make a certificate request using 'req'
rsa
Using configuration from CAss.cnf
Generating a 512 bit RSA private key
..++++++++++++
............++++++++++++
writing new private key to 'keyCA.ss'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Dodgy CA

convert the certificate request into a self signed certificate using 'x509'
Signature ok
subject=/C=AU/O=Dodgy Brothers/CN=Dodgy CA
Getting Private key

convert a certificate into a certificate request using 'x509'
Getting request Private Key
Generating certificate request
Using configuration from ../apps/openssl.cnf
verify OK
Using configuration from ../apps/openssl.cnf
verify OK
certCA.ss: OK

make another certificate request using 'req'
Using configuration from Uss.cnf
Generating a 512 bit RSA private key
.......................++++++++++++
..........++++++++++++
writing new private key to 'keyU.ss'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Brother 1
Common Name (eg, YOUR name) []:Brother 2

sign certificate request with the just created CA via 'x509'
Signature ok
subject=/C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
Getting CA Private Key
certU.ss: OK

Certificate details
subject= /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
issuer= /C=AU/O=Dodgy Brothers/CN=Dodgy CA
notBefore=Sep 18 02:26:46 2000 GMT
notAfter=Oct 18 02:26:46 2000 GMT

The generated CA certificate is certCA.ss
The generated CA private key is keyCA.ss
The generated user certificate is certU.ss
The generated user private key is keyU.ss
rsa
Generate and certify a test certificate via the 'ca' program
CA certificate filename (or enter to create)
Making CA certificate ...
Using configuration from CAss.cnf
Generating a 512 bit RSA private key
....++++++++++++
.++++++++++++
writing new private key to './demoCA/private/./cakey.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Dodgy CA
Using configuration from Uss.cnf
Generating a 512 bit RSA private key
..........................++++++++++++
......++++++++++++
writing new private key to 'newreq.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Brother 1
Common Name (eg, YOUR name) []:Brother 2
Request (and private key) is in newreq.pem
Using configuration from ../apps/openssl.cnf
Check that the request matches the signature
Signature ok
The Subjects Distinguished Name is as follows
countryName           :PRINTABLE:'AU'
organizationName      :PRINTABLE:'Dodgy Brothers'
commonName            :PRINTABLE:'Brother 1'
commonName            :PRINTABLE:'Brother 2'
Certificate is to be certified until Sep 18 02:26:51 2001 GMT (365 days)
Sign the certificate? [y/n]:

1 out of 1 certificate requests certified, commit? [y/n]Write out database with 1 new 
entries
Data Base Updated
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: md5WithRSAEncryption
        Issuer: C=AU, O=Dodgy Brothers, CN=Dodgy CA
        Validity
            Not Before: Sep 18 02:26:51 2000 GMT
            Not After : Sep 18 02:26:51 2001 GMT
        Subject: C=AU, O=Dodgy Brothers, CN=Brother 1, CN=Brother 2
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
            RSA Public Key: (512 bit)
                Modulus (512 bit):
                    00:e2:61:fd:5d:b8:cb:a9:dd:f0:0e:72:c2:c7:3b:
                    54:d3:97:cc:c4:c4:bb:c9:dd:83:c8:6b:8e:25:9f:
                    e4:95:d6:36:8d:45:89:45:56:e1:a2:f6:d1:9d:9d:
                    99:d4:b9:e2:ac:aa:93:ad:09:72:e0:65:d3:77:eb:
                    d3:b1:55:55:1f
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Basic Constraints: 
                CA:FALSE
            Netscape Comment: 
                OpenSSL Generated Certificate
            X509v3 Subject Key Identifier: 
                47:27:70:04:1C:B0:5A:8C:B7:33:8F:33:E3:6D:7A:D4:3B:4F:91:40
            X509v3 Authority Key Identifier: 
                DirName:/C=AU/O=Dodgy Brothers/CN=Dodgy CA
                serial:00

    Signature Algorithm: md5WithRSAEncryption
        02:39:fc:a7:fd:81:6d:07:1f:c0:e9:b0:56:10:a2:33:6c:98:
        2f:81:f1:2e:d9:37:04:bb:2c:12:9f:6a:d7:d5:3d:6d:ca:01:
        12:c4:a9:20:43:03:6f:8d:a1:fe:dd:02:33:72:a4:5a:81:d5:
        87:8f:25:48:7a:25:2d:28:cd:af
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Signed certificate is in newcert.pem
newcert.pem: OK
test SSL protocol
test sslv2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with client authentication
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with both client and server authentication
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv3
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with client authentication
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with both client and server authentication
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with client authentication
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with both client and server authentication
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2 via BIO pair
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with server authentication via BIO pair
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with client authentication via BIO pair
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with both client and server authentication via BIO pair
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv3 via BIO pair
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with server authentication via BIO pair
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with client authentication via BIO pair
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with both client and server authentication via BIO pair
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 via BIO pair
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 w/o DHE via BIO pair
TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with 1024bit DHE via BIO pair
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with client authentication via BIO pair
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with both client and server authentication via BIO pair
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test tls1 with 1024bit anonymous DH, multiple handshakes
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
10 handshakes of 1 bytes done
Approximate total server time:   0.30 s
Approximate total client time:   1.69 s
rsa
test tls1 with 1024bit RSA, no DHE, multiple handshakes
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
10 handshakes of 1 bytes done
Approximate total server time:   0.29 s
Approximate total client time:   0.60 s
test tls1 with 1024bit RSA, 1024bit DHE, multiple handshakes
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA
10 handshakes of 1 bytes done
Approximate total server time:   0.58 s
Approximate total client time:   1.70 s
make[1]: Leaving directory `/d/src/openssl-0.9.6-beta2/test'
OpenSSL 0.9.6-beta2 17 Sep 2000
built on: Mon Sep 18 10:14:53  2000
platform: CygWin32
options:  bn(64,32) md2(int) rc4(idx,int) des(ptr,risc1,16,long) idea(int) 
blowfish(idx) 
compiler: gcc -DDSO_WIN32 -DTERMIOS -DL_ENDIAN -fomit-frame-pointer -O3 -m486 -Wall

Reply via email to