I just compiled openssl-0.9.6-beta3 successfully on an HP-UX 11.00 using
HP-UX ANSI/C compiler.
However the s_client is not working here, too, as already stated by
Hartmut Lehnert on the
openssl-bugs mailing list :-(

No compilation report using gcc since gcc-2.95.2 does not support HP-UX
11.00.

'uname -a' gives:
HP-UX birdie B.11.00 A 9000/778 2001970817 two-user license

Here is the output of 'make test':

Doing certs
ICE-CA.pem => 6bee6be3.0
ICE-root.pem => adbec561.0
ICE-user.pem => 3ecf89a3.0
ca-cert.pem => 1f6c59cd.0
dsa-ca.pem => 73912336.0
dsa-pca.pem => 24867d38.0
factory.pem => f3e90025.0
nortelCA.pem => 1ef89214.0
pca-cert.pem => 8caad35e.0
rsa-cca.pem => a99c5886.0
rsa-ssca.pem => f73e89fd.0
thawteCb.pem => ddc328ff.0
thawteCp.pem => c33a80d4.0
timCA.pem => 8c401b31.0
tjhCA.pem => 052eae11.0
vsign1.pem => 2edf7016.0
vsign2.pem => b5f329fa.0
vsign3.pem => 7651b327.0
vsignss.pem => f73e89fd.1
vsigntca.pem => 18d46017.0
touch rehash.time
testing...
make[1]: Entering directory
`/home/ftp/dist/mirrors/CompilationDir/openssl-0.9.6-beta3/test'
make[2]: Entering directory
`/home/ftp/dist/mirrors/CompilationDir/openssl-0.9.6-beta3/apps'
make[2]: Nothing to be done for `all'.
make[2]: Leaving directory
`/home/ftp/dist/mirrors/CompilationDir/openssl-0.9.6-beta3/apps'
./destest
Doing cbcm
Doing ecb
Doing ede ecb
Doing cbc
Doing desx cbc
Doing ede cbc
Doing pcbc
Doing cfb8 cfb16 cfb32 cfb48 cfb64 cfb64() ede_cfb64() done
Doing ofb
Doing ofb64
Doing ede_ofb64
Doing cbc_cksum
Doing quad_cksum
input word alignment test 0 1 2 3
output word alignment test 0 1 2 3
fast crypt test
./ideatest
ecb idea ok
cbc idea ok
cfb64 idea ok
./shatest
test 1 ok
test 2 ok
test 3 ok
./sha1test
test 1 ok
test 2 ok
test 3 ok
./md4test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./md5test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./hmactest
test 0 ok
test 1 ok
test 2 ok
test 3 ok
./md2test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
./mdc2test
pad1 - ok
pad2 - ok
./rmdtest
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
test 8 ok
./rc2test
ecb RC2 ok
./rc4test
test 0 ok
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test end processing ....................done
test multi-call ....................done
./rc5test
ecb RC5 ok
cbc RC5 ok
./bftest
testing blowfish in raw ecb mode
testing blowfish in ecb mode
testing blowfish set_key
testing blowfish in cbc mode
testing blowfish in cfb64 mode
testing blowfish in ofb64
./casttest
ecb cast5 ok
This test will take some time....123456789ABCDEF ok
./randtest
test 1 done
test 2 done
test 3 done
test 4 done
starting big number library test, could take a while...
test BN_add
test BN_sub
test BN_lshift1
test BN_lshift (fixed)
test BN_lshift
test BN_rshift1
test BN_rshift
test BN_sqr
test BN_mul
test BN_div
test BN_div_recp
test BN_mod
test BN_mod_mul
test BN_mont
test BN_mod_exp
test BN_exp
running bc
....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

...........
1815 tests passed
test a^b%c implementations
./exptest
....................................................................................................................................................................

.................................... done
cat
base64
base64
base64 base64
bf
bf base64
bf-cbc
bf-cbc base64
bf-cfb
bf-cfb base64
bf-ecb
bf-ecb base64
bf-ofb
bf-ofb base64
cast
cast base64
cast-cbc
cast-cbc base64
cast5-cbc
cast5-cbc base64
cast5-cfb
cast5-cfb base64
cast5-ecb
cast5-ecb base64
cast5-ofb
cast5-ofb base64
des
des base64
des-cbc
des-cbc base64
des-cfb
des-cfb base64
des-ecb
des-ecb base64
des-ede
des-ede base64
des-ede-cbc
des-ede-cbc base64
des-ede-cfb
des-ede-cfb base64
des-ede-ofb
des-ede-ofb base64
des-ede3
des-ede3 base64
des-ede3-cbc
des-ede3-cbc base64
des-ede3-cfb
des-ede3-cfb base64
des-ede3-ofb
des-ede3-ofb base64
des-ofb
des-ofb base64
des3
des3 base64
desx
desx base64
idea
idea base64
idea-cbc
idea-cbc base64
idea-cfb
idea-cfb base64
idea-ecb
idea-ecb base64
idea-ofb
idea-ofb base64
rc2
rc2 base64
rc2-40-cbc
rc2-40-cbc base64
rc2-64-cbc
rc2-64-cbc base64
rc2-cbc
rc2-cbc base64
rc2-cfb
rc2-cfb base64
rc2-ecb
rc2-ecb base64
rc2-ofb
rc2-ofb base64
rc4
rc4 base64
rc4-40
rc4-40 base64
rc5
rc5 base64
rc5-cbc
rc5-cbc base64
rc5-cfb
rc5-cfb base64
rc5-ecb
rc5-ecb base64
rc5-ofb
rc5-ofb base64
echo test normal x509v1 certificate
test normal x509v1 certificate
sh ./tx509 2>/dev/null
testing X509 conversions
p -> d
p -> n
p -> p
d -> d
n -> d
p -> d
d -> n
n -> n
p -> n
d -> p
n -> p
p -> p
echo test first x509v3 certificate
test first x509v3 certificate
sh ./tx509 v3-cert1.pem 2>/dev/null
testing X509 conversions
p -> d
p -> n
p -> p
d -> d
n -> d
p -> d
d -> n
n -> n
p -> n
d -> p
n -> p
p -> p
echo test second x509v3 certificate
test second x509v3 certificate
sh ./tx509 v3-cert2.pem 2>/dev/null
testing X509 conversions
p -> d
p -> n
p -> p
d -> d
n -> d
p -> d
d -> n
n -> n
p -> n
d -> p
n -> p
p -> p
rsa
testing rsa conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
./rsa_test
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
testing crl conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
testing session-id conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
Generate and verify a certificate request
generating certificate request
rsa
There should be a 2 sequences of .'s and some +'s.
There should not be more that at most 80 per line
This could take some time.
Using configuration from test.cnf
Generating a 512 bit RSA private key
..++++++++++++
...........++++++++++++
writing new private key to 'testkey.pem'
-----
You are about to be asked to enter information that will be incorporated

into your certificate request.
What you are about to enter is what is called a Distinguished Name or a
DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
State or Province Name (full name) [Queensland]:
Locality Name (eg, city) []:Brisbane
Organization Name (eg, company) []:CryptSoft Pty Ltd
Organizational Unit Name (eg, section) []:.
Common Name (eg, YOUR name) []:Eric Young
Email Address []:[EMAIL PROTECTED]
Using configuration from test.cnf
verify OK
testing req conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
testing req conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
testing pkcs7 conversions
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
testing pkcs7 conversions (2)
p -> d
p -> p
d -> d
p -> d
d -> p
p -> p
The following command should have some OK's and some failures
There are definitly a few expired certificates
../apps/openssl verify -CApath ../certs ../certs/*.pem
../certs/ICE-CA.pem: /O=European ICE-TEL project/OU=V3-Certification
Authority
error 10 at 1 depth lookup:Certificate has expired
/O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/ICE-root.pem: /O=European ICE-TEL project/OU=V3-Certification
Authority
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/ICE-user.pem: /O=European ICE-TEL project/OU=V3-Certification
Authority
error 10 at 2 depth lookup:Certificate has expired
/O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt
error 10 at 1 depth lookup:Certificate has expired
/O=European ICE-TEL project/OU=V3-Certification
Authority/L=Darmstadt/CN=USER
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/ca-cert.pem: OK
../certs/dsa-ca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty
Ltd/CN=PCA
error 10 at 1 depth lookup:Certificate has expired
/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=CA
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/dsa-pca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty
Ltd/CN=PCA
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/factory.pem: /C=GB/O=UCL/OU=ICE-TEL Project/CN=TrustFactory
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/nortelCA.pem: OK
../certs/pca-cert.pem: OK
../certs/rsa-cca.pem: /C=US/O=RSA Data Security, Inc./OU=Commercial
Certification Authority
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/rsa-ssca.pem: /C=US/O=RSA Data Security, Inc./OU=Secure Server
Certification Authority
error 18 at 0 depth lookup:self signed certificate
/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority

error 10 at 0 depth lookup:Certificate has expired
OK
../certs/thawteCb.pem: OK
../certs/thawteCp.pem: OK
../certs/timCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty
Ltd/OU=development/CN=CryptSoft Dev CA
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/tjhCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty
Ltd/OU=WORTHLESS CERTIFICATION AUTHORITIES/CN=ZERO VALUE CA -
DEMONSTRATION PURPOSES ONLY
error 10 at 0 depth lookup:Certificate has expired
OK
../certs/vsign1.pem: OK
../certs/vsign2.pem: OK
../certs/vsign3.pem: OK
../certs/vsignss.pem: /C=US/O=RSA Data Security, Inc./OU=Secure Server
Certification Authority
error 18 at 0 depth lookup:self signed certificate
OK
../certs/vsigntca.pem: OK
Generate a set of DH parameters
./dhtest
..+..+.+.+..+.+.++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*

p    =F1675CC4245E7973
g    =5
pri 1=5600D9E77865EAE4
pub 1=ACE50E9EDBA3640A
pri 2=73543955E1F74078
pub 2=14F304B36E678567
key1 =AABCC12B24766E07
key2 =AABCC12B24766E07
Generate a set of DSA parameters
./dsatest
test generation of DSA parameters
.++++++++++++++++++++++++++++++++++++++++++++++++++*
...+........+..+...+............+.+..+..........................................................................+++++++++++++++++++++++++++++++++++++++++++++++++++*

seed
D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3
counter=105 h=2
P:
    00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68:
    69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d:
    78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac:
    32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36:
    ee:31:c8:02:91
Q:
    00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30:
    f4:8e:da:ce:91:5f
G:
    62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5:
    00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce:
    2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21:
    92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53:
    e6:d7:88:02
./dsatest -app2_1
test generation of DSA parameters
.++++++++++++++++++++++++++++++++++++++++++++++++++*
...+........+..+...+............+.+..+..........................................................................+++++++++++++++++++++++++++++++++++++++++++++++++++*

seed
D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3
counter=105 h=2
P:
    00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68:
    69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d:
    78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac:
    32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36:
    ee:31:c8:02:91
Q:
    00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30:
    f4:8e:da:ce:91:5f
G:
    62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5:
    00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce:
    2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21:
    92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53:
    e6:d7:88:02
Generate and certify a test certificate

make a certificate request using 'req'
rsa
Using configuration from CAss.cnf
Generating a 512 bit RSA private key
.......................++++++++++++
............++++++++++++
writing new private key to 'keyCA.ss'
-----
You are about to be asked to enter information that will be incorporated

into your certificate request.
What you are about to enter is what is called a Distinguished Name or a
DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Dodgy CA

convert the certificate request into a self signed certificate using
'x509'
unable to load 'random state'
This means that the random number generator has not been seeded
with much random data.
Consider setting the RANDFILE environment variable to point at a file
that
'random' data can be kept in (the file will be overwritten).
Signature ok
subject=/C=AU/O=Dodgy Brothers/CN=Dodgy CA
Getting Private key

convert a certificate into a certificate request using 'x509'
unable to load 'random state'
This means that the random number generator has not been seeded
with much random data.
Consider setting the RANDFILE environment variable to point at a file
that
'random' data can be kept in (the file will be overwritten).
Getting request Private Key
Generating certificate request
Using configuration from ../apps/openssl.cnf
verify OK
Using configuration from ../apps/openssl.cnf
verify OK
certCA.ss: OK

make another certificate request using 'req'
Using configuration from Uss.cnf
Generating a 512 bit RSA private key
...++++++++++++
.....................++++++++++++
writing new private key to 'keyU.ss'
-----
You are about to be asked to enter information that will be incorporated

into your certificate request.
What you are about to enter is what is called a Distinguished Name or a
DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Brother 1
Common Name (eg, YOUR name) []:Brother 2

sign certificate request with the just created CA via 'x509'
unable to load 'random state'
This means that the random number generator has not been seeded
with much random data.
Consider setting the RANDFILE environment variable to point at a file
that
'random' data can be kept in (the file will be overwritten).
Signature ok
subject=/C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
Getting CA Private Key
certU.ss: OK

Certificate details
subject= /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
issuer= /C=AU/O=Dodgy Brothers/CN=Dodgy CA
notBefore=Sep 22 12:10:19 2000 GMT
notAfter=Oct 22 12:10:19 2000 GMT

The generated CA certificate is certCA.ss
The generated CA private key is keyCA.ss
The generated user certificate is certU.ss
The generated user private key is keyU.ss
rsa
Generate and certify a test certificate via the 'ca' program
CA certificate filename (or enter to create)
Making CA certificate ...
Using configuration from CAss.cnf
Generating a 512 bit RSA private key
..++++++++++++
........++++++++++++
writing new private key to './demoCA/private/./cakey.pem'
-----
You are about to be asked to enter information that will be incorporated

into your certificate request.
What you are about to enter is what is called a Distinguished Name or a
DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Dodgy CA
Using configuration from Uss.cnf
Generating a 512 bit RSA private key
.......++++++++++++
......++++++++++++
writing new private key to 'newreq.pem'
-----
You are about to be asked to enter information that will be incorporated

into your certificate request.
What you are about to enter is what is called a Distinguished Name or a
DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Brother 1
Common Name (eg, YOUR name) []:Brother 2
Request (and private key) is in newreq.pem
Using configuration from ../apps/openssl.cnf
unable to load 'random state'
This means that the random number generator has not been seeded
with much random data.
Check that the request matches the signature
Signature ok
The Subjects Distinguished Name is as follows
countryName           :PRINTABLE:'AU'
organizationName      :PRINTABLE:'Dodgy Brothers'
commonName            :PRINTABLE:'Brother 1'
commonName            :PRINTABLE:'Brother 2'
Certificate is to be certified until Sep 22 12:10:22 2001 GMT (365 days)

Sign the certificate? [y/n]:

1 out of 1 certificate requests certified, commit? [y/n]Write out
database with 1 new entries
Data Base Updated
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: md5WithRSAEncryption
        Issuer: C=AU, O=Dodgy Brothers, CN=Dodgy CA
        Validity
            Not Before: Sep 22 12:10:22 2000 GMT
            Not After : Sep 22 12:10:22 2001 GMT
        Subject: C=AU, O=Dodgy Brothers, CN=Brother 1, CN=Brother 2
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
            RSA Public Key: (512 bit)
                Modulus (512 bit):
                    00:ce:95:7e:eb:86:15:f0:e2:31:95:3d:dd:a0:62:
                    7c:97:f8:0e:93:57:ee:f4:c3:99:73:77:2a:f2:52:
                    aa:74:6b:f9:e2:e4:f5:92:c8:e2:ce:9f:cf:d5:6d:
                    fa:98:2d:54:c7:23:56:99:4d:93:d9:5f:92:40:a0:
                    52:76:bb:42:ad
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:FALSE
            Netscape Comment:
                OpenSSL Generated Certificate
            X509v3 Subject Key Identifier:

9A:9D:48:79:AA:1B:A8:FE:25:BC:EF:7F:AC:E6:45:8A:4B:CE:BE:03
            X509v3 Authority Key Identifier:
                DirName:/C=AU/O=Dodgy Brothers/CN=Dodgy CA
                serial:00

    Signature Algorithm: md5WithRSAEncryption
        02:e4:c5:63:0b:46:4a:13:c7:76:07:6b:2c:6b:b2:f1:6b:c6:
        d6:8b:af:8b:a9:ab:3b:c9:bd:2f:dd:cb:96:eb:7c:47:1a:c4:
        ff:00:92:c2:e8:8f:1b:cf:ac:f9:a4:c0:76:b1:ca:bc:86:21:
        a4:e2:2a:40:5d:65:06:c5:1a:03
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Signed certificate is in newcert.pem
newcert.pem: OK
test SSL protocol
test sslv2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with client authentication
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with both client and server authentication
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv3
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with client authentication
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with both client and server authentication
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with client authentication
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with both client and server authentication
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2 via BIO pair
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with server authentication via BIO pair
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with client authentication via BIO pair
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv2 with both client and server authentication via BIO pair
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
test sslv3 via BIO pair
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with server authentication via BIO pair
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with client authentication via BIO pair
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv3 with both client and server authentication via BIO pair
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 via BIO pair
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 w/o DHE via BIO pair
TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 512 bit RSA
test sslv2/sslv3 with 1024bit DHE via BIO pair
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512
bit RSA
test sslv2/sslv3 with server authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA
test tls1 with 1024bit anonymous DH, multiple handshakes
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA
10 handshakes of 1 bytes done
Approximate total server time:   2.15 s
Approximate total client time:  12.67 s
rsa
test tls1 with 1024bit RSA, no DHE, multiple handshakes
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA
10 handshakes of 1 bytes done
Approximate total server time:   1.87 s
Approximate total client time:   0.14 s
test tls1 with 1024bit RSA, 1024bit DHE, multiple handshakes
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024
bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024
bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024
bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024
bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024
bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024
bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024
bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024
bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024
bit RSA
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024
bit RSA
10 handshakes of 1 bytes done
Approximate total server time:   3.99 s
Approximate total client time:  12.78 s
make[1]: Leaving directory
`/home/ftp/dist/mirrors/CompilationDir/openssl-0.9.6-beta3/test'
OpenSSL 0.9.6-beta3 21 Sep 2000
built on: Fri Sep 22 13:26:14 METDST 2000
platform: hpux-cc
options:  bn(64,32) md2(int) rc4(ptr,int) des(ptr,risc1,16,long)
idea(int) blowfish(idx)
compiler: cc -DTHREADS -DDSO_DL -DB_ENDIAN -DBN_DIV2W -DMD32_XARRAY -Ae
+ESlit +O3 -z

--
Heiko Nardmann (Dipl.-Ing.), [EMAIL PROTECTED], Software Development

secunet Security Networks AG - Sicherheit in Netzwerken
(www.secunet.de),
Weidenauer Str. 223-225, D-57076 Siegen
Tel. : +49 271 48950-13, Fax  : +49 271 48950-50


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to