testing... make[2]: Nothing to be done for `all'. ./destest Doing cbcm Doing ecb Doing ede ecb Doing cbc Doing desx cbc Doing ede cbc Doing pcbc Doing cfb8 cfb16 cfb32 cfb48 cfb64 cfb64() ede_cfb64() done Doing ofb Doing ofb64 Doing ede_ofb64 Doing cbc_cksum Doing quad_cksum input word alignment test 0 1 2 3 output word alignment test 0 1 2 3 fast crypt test ./ideatest ecb idea ok cbc idea ok cfb64 idea ok ./shatest test 1 ok test 2 ok test 3 ok ./sha1test test 1 ok test 2 ok test 3 ok ./md4test test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test 6 ok test 7 ok ./md5test test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test 6 ok test 7 ok ./hmactest test 0 ok test 1 ok test 2 ok test 3 ok ./md2test test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test 6 ok test 7 ok ./mdc2test pad1 - ok pad2 - ok ./rmdtest test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test 6 ok test 7 ok test 8 ok ./rc2test ecb RC2 ok ./rc4test test 0 ok test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test end processing ....................done test multi-call ....................done ./rc5test ecb RC5 ok cbc RC5 ok ./bftest testing blowfish in raw ecb mode testing blowfish in ecb mode testing blowfish set_key testing blowfish in cbc mode testing blowfish in cfb64 mode testing blowfish in ofb64 ./casttest ecb cast5 ok This test will take some time....123456789ABCDEF ok ./randtest test 1 done test 2 done test 3 done test 4 done starting big number library test, could take a while... running bc test a^b%c implementations ./exptest ........................................................................................................................................................................................................ done cat base64 base64 base64 base64 bf bf base64 bf-cbc bf-cbc base64 bf-cfb bf-cfb base64 bf-ecb bf-ecb base64 bf-ofb bf-ofb base64 cast cast base64 cast-cbc cast-cbc base64 cast5-cbc cast5-cbc base64 cast5-cfb cast5-cfb base64 cast5-ecb cast5-ecb base64 cast5-ofb cast5-ofb base64 des des base64 des-cbc des-cbc base64 des-cfb des-cfb base64 des-ecb des-ecb base64 des-ede des-ede base64 des-ede-cbc des-ede-cbc base64 des-ede-cfb des-ede-cfb base64 des-ede-ofb des-ede-ofb base64 des-ede3 des-ede3 base64 des-ede3-cbc des-ede3-cbc base64 des-ede3-cfb des-ede3-cfb base64 des-ede3-ofb des-ede3-ofb base64 des-ofb des-ofb base64 des3 des3 base64 desx desx base64 idea idea base64 idea-cbc idea-cbc base64 idea-cfb idea-cfb base64 idea-ecb idea-ecb base64 idea-ofb idea-ofb base64 rc2 rc2 base64 rc2-40-cbc rc2-40-cbc base64 rc2-64-cbc rc2-64-cbc base64 rc2-cbc rc2-cbc base64 rc2-cfb rc2-cfb base64 rc2-ecb rc2-ecb base64 rc2-ofb rc2-ofb base64 rc4 rc4 base64 rc4-40 rc4-40 base64 rc5 rc5 base64 rc5-cbc rc5-cbc base64 rc5-cfb rc5-cfb base64 rc5-ecb rc5-ecb base64 rc5-ofb rc5-ofb base64 echo test normal x509v1 certificate test normal x509v1 certificate sh ./tx509 2>/dev/null testing X509 conversions p -> d p -> n p -> p d -> d n -> d p -> d d -> n n -> n p -> n d -> p n -> p p -> p echo test first x509v3 certificate test first x509v3 certificate sh ./tx509 v3-cert1.pem 2>/dev/null testing X509 conversions p -> d p -> n p -> p d -> d n -> d p -> d d -> n n -> n p -> n d -> p n -> p p -> p echo test second x509v3 certificate test second x509v3 certificate sh ./tx509 v3-cert2.pem 2>/dev/null testing X509 conversions p -> d p -> n p -> p d -> d n -> d p -> d d -> n n -> n p -> n d -> p n -> p p -> p rsa testing rsa conversions p -> d p -> p d -> d p -> d d -> p p -> p ./rsa_test PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok testing crl conversions p -> d p -> p d -> d p -> d d -> p p -> p testing session-id conversions p -> d p -> p d -> d p -> d d -> p p -> p Generate and verify a certificate request generating certificate request rsa There should be a 2 sequences of .'s and some +'s. There should not be more that at most 80 per line This could take some time. testing req conversions p -> d p -> p d -> d p -> d d -> p p -> p testing req conversions p -> d p -> p d -> d p -> d d -> p p -> p testing pkcs7 conversions p -> d p -> p d -> d p -> d d -> p p -> p testing pkcs7 conversions (2) p -> d p -> p d -> d p -> d d -> p p -> p The following command should have some OK's and some failures There are definitly a few expired certificates ../apps/openssl verify -CApath ../certs ../certs/*.pem ../certs/ICE-CA.pem: /O=European ICE-TEL project/OU=V3-Certification Authority error 10 at 1 depth lookup:certificate has expired /O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt error 10 at 0 depth lookup:certificate has expired OK ../certs/ICE-root.pem: /O=European ICE-TEL project/OU=V3-Certification Authority error 10 at 0 depth lookup:certificate has expired OK ../certs/ICE-user.pem: /O=European ICE-TEL project/OU=V3-Certification Authority error 10 at 2 depth lookup:certificate has expired /O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt error 10 at 1 depth lookup:certificate has expired /O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt/CN=USER error 10 at 0 depth lookup:certificate has expired OK ../certs/ca-cert.pem: OK ../certs/dsa-ca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=PCA error 10 at 1 depth lookup:certificate has expired /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=CA error 10 at 0 depth lookup:certificate has expired OK ../certs/dsa-pca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=PCA error 10 at 0 depth lookup:certificate has expired OK ../certs/factory.pem: /C=GB/O=UCL/OU=ICE-TEL Project/CN=TrustFactory error 10 at 0 depth lookup:certificate has expired OK ../certs/nortelCA.pem: OK ../certs/pca-cert.pem: OK ../certs/rsa-cca.pem: /C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority error 10 at 0 depth lookup:certificate has expired OK ../certs/thawteCb.pem: OK ../certs/thawteCp.pem: OK ../certs/timCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty Ltd/OU=development/CN=CryptSoft Dev CA error 10 at 0 depth lookup:certificate has expired OK ../certs/tjhCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty Ltd/OU=WORTHLESS CERTIFICATION AUTHORITIES/CN=ZERO VALUE CA - DEMONSTRATION PURPOSES ONLY error 10 at 0 depth lookup:certificate has expired OK ../certs/vsign1.pem: OK ../certs/vsign2.pem: OK ../certs/vsign3.pem: OK ../certs/vsignss.pem: OK ../certs/vsigntca.pem: OK Generate a set of DH parameters ./dhtest ..+.+..+.+.......+...++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++* p =B6FDFB19B8D6C57F g =5 pri 1=762362EC993DF20C pub 1=3FDB988CBFA8CCEB pri 2=4AEE14F2F489497D pub 2=1DC05F73A3B39FA3 key1 =38E076FF5D20049A key2 =38E076FF5D20049A Generate a set of DSA parameters ./dsatest ./dsatest -app2_1 Generate and certify a test certificate make a certificate request using 'req' rsa convert the certificate request into a self signed certificate using 'x509' convert a certificate into a certificate request using 'x509' certCA.ss: OK make another certificate request using 'req' sign certificate request with the just created CA via 'x509' certU.ss: OK Certificate details subject= /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 issuer= /C=AU/O=Dodgy Brothers/CN=Dodgy CA notBefore=Jan 4 01:24:44 2002 GMT notAfter=Feb 3 01:24:44 2002 GMT The generated CA certificate is certCA.ss The generated CA private key is keyCA.ss The generated user certificate is certU.ss The generated user private key is keyU.ss rsa Generate and certify a test certificate via the 'ca' program CA certificate filename (or enter to create) Making CA certificate ... Request (and private key) is in newreq.pem Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: md5WithRSAEncryption Issuer: C=AU, O=Dodgy Brothers, CN=Dodgy CA Validity Not Before: Jan 4 01:24:45 2002 GMT Not After : Jan 4 01:24:45 2003 GMT Subject: C=AU, O=Dodgy Brothers, CN=Brother 1, CN=Brother 2 Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (512 bit) Modulus (512 bit): 00:c1:a0:44:4d:4b:d9:63:5a:f8:73:a6:40:2c:e0: 85:c3:fd:d7:67:39:bf:42:81:ca:4b:4d:5e:f0:be: 2d:55:1f:9e:f1:d4:05:b2:bb:03:66:fa:3d:56:a4: 67:48:c2:1c:02:fa:63:5a:db:2e:96:a7:81:88:0d: 0a:4e:45:a1:61 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Comment: OpenSSL Generated Certificate X509v3 Subject Key Identifier: 88:F6:7A:F6:8F:E5:2D:83:4E:14:46:B0:BA:57:BE:28:3A:97:5E:D6 X509v3 Authority Key Identifier: DirName:/C=AU/O=Dodgy Brothers/CN=Dodgy CA serial:00 Signature Algorithm: md5WithRSAEncryption 20:71:a8:da:ec:3e:89:05:8d:38:3d:ea:0a:39:0c:cb:92:28: f1:dd:1f:b8:76:f9:48:61:ba:63:fe:af:6d:b8:01:fb:9d:22: c8:94:ff:fe:7e:d2:93:1e:4b:b8:fe:2e:b8:d8:a4:f7:2f:61: 1e:1b:9d:ee:cf:c4:01:a4:be:53 -----BEGIN CERTIFICATE----- MIICITCCAcugAwIBAgIBATANBgkqhkiG9w0BAQQFADA5MQswCQYDVQQGEwJBVTEX MBUGA1UEChMORG9kZ3kgQnJvdGhlcnMxETAPBgNVBAMTCERvZGd5IENBMB4XDTAy MDEwNDAxMjQ0NVoXDTAzMDEwNDAxMjQ0NVowTjELMAkGA1UEBhMCQVUxFzAVBgNV BAoTDkRvZGd5IEJyb3RoZXJzMRIwEAYDVQQDEwlCcm90aGVyIDExEjAQBgNVBAMT CUJyb3RoZXIgMjBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQDBoERNS9ljWvhzpkAs 4IXD/ddnOb9CgcpLTV7wvi1VH57x1AWyuwNm+j1WpGdIwhwC+mNa2y6Wp4GIDQpO RaFhAgMBAAGjgagwgaUwCQYDVR0TBAIwADAsBglghkgBhvhCAQ0EHxYdT3BlblNT TCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFIj2evaP5S2DThRGsLpX vig6l17WMEsGA1UdIwREMEKhPaQ7MDkxCzAJBgNVBAYTAkFVMRcwFQYDVQQKEw5E b2RneSBCcm90aGVyczERMA8GA1UEAxMIRG9kZ3kgQ0GCAQAwDQYJKoZIhvcNAQEE BQADQQAgcaja7D6JBY04PeoKOQzLkijx3R+4dvlIYbpj/q9tuAH7nSLIlP/+ftKT Hku4/i642KT3L2EeG53uz8QBpL5T -----END CERTIFICATE----- Signed certificate is in newcert.pem newcert.pem: OK test SSL protocol test sslv2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with server authentication SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with client authentication SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with both client and server authentication SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv3 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with server authentication SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with client authentication SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with both client and server authentication SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with server authentication TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with client authentication TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with both client and server authentication TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2 via BIO pair SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with server authentication via BIO pair SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with client authentication via BIO pair SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with both client and server authentication via BIO pair SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv3 via BIO pair SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with server authentication via BIO pair SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with client authentication via BIO pair SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with both client and server authentication via BIO pair SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 via BIO pair TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 w/o DHE via BIO pair TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with 1024bit DHE via BIO pair DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with server authentication TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with client authentication via BIO pair TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with both client and server authentication via BIO pair TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test tls1 with 1024bit anonymous DH, multiple handshakes DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA 10 handshakes of 1 bytes done Approximate total server time: 0.16 s Approximate total client time: 0.77 s rsa test tls1 with 1024bit RSA, no DHE, multiple handshakes DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA 10 handshakes of 1 bytes done Approximate total server time: 0.16 s Approximate total client time: 0.01 s test tls1 with 1024bit RSA, 1024bit DHE, multiple handshakes DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA 10 handshakes of 1 bytes done Approximate total server time: 0.27 s Approximate total client time: 0.77 s OpenSSL 0.9.6c 21 dec 2001 built on: Fri Jan 4 01:13:55 GMT 2002 platform: darwin-ppc-cc options: bn(64,32) md2(int) rc4(ptr,char) des(idx,cisc,16,long) idea(int) blowfish(ptr) compiler: cc -fPIC -DTHREADS -D_REENTRANT -O3 -D_DARWIN -DB_ENDIAN