OpenSSL version: 0.9.5a OS Version: IRIX 6.5 Compiler: Base Compiler Development Environment, 7.3 Configure command: ./Configure irix64-mips4-cc Ignoring the lack of random data; take note, in particular, the exponent: % ./apps/openssl genrsa -out k 1024 warning, not much extra random data, consider using the -rand option Generating RSA private key, 1024 bit long modulus ...............++++++ ......++++++ e is 281479271743489 (0x1000100010001) % This particular exponent is not among the set of expected exponents from the man-page, and also cannot be read by MSIE5 (if a Cert based on this key is put on a Win-XX box as a .cer file, the Certificate Manager reports a 0-length RSA key!). My main problem, right now, is that I noticed this _after_ getting a Cert from Thawte, and the resultant failure of IE5 clients on Win-XX not being able to connect at all. Now they're wanting US$50 to re-cert with a "good" key which is quite annoying me, but I cannot do anything till I get in and call them and/or our purchasing people provide CC #s. Has anyone noticed similar behaviour, or was I stupid for trying the irix64 compile option rather than staying with 32? Here's most of the 'make test', skipping to the RSA bits: Script started on Tue May 30 22:17:45 2000 [m[m[m[Jmorpheus# [Kmmake test testing... ./destest Doing cbcm Doing ecb Doing ede ecb Doing cbc Doing desx cbc Doing ede cbc [ ... ] rsa testing rsa conversions p -> d p -> p d -> d p -> d d -> p p -> p ./rsa_test PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok testing crl conversions p -> d p -> p d -> d p -> d d -> p p -> p testing session-id conversions p -> d p -> p d -> d p -> d d -> p p -> p Generate and verify a certificate request generating certificate request rsa There should be a 2 sequences of .'s and some +'s. There should not be more that at most 80 per line This could take some time. Using configuration from test.cnf Generating a 512 bit RSA private key .++++++++++++ .++++++++++++ writing new private key to 'testkey.pem' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU State or Province Name (full name) [Queensland]: Locality Name (eg, city) []:Brisbane Organization Name (eg, company) []:CryptSoft Pty Ltd Organizational Unit Name (eg, section) []:. Common Name (eg, YOUR name) []:Eric Young Email Address []:[EMAIL PROTECTED] Using configuration from test.cnf verify OK testing req conversions p -> d p -> p d -> d p -> d d -> p p -> p testing req conversions p -> d p -> p d -> d p -> d d -> p p -> p testing pkcs7 conversions p -> d p -> p d -> d p -> d d -> p p -> p testing pkcs7 conversions (2) p -> d p -> p d -> d p -> d d -> p p -> p The following command should have some OK's and some failures There are definitly a few expired certificates ../apps/openssl verify -CApath ../certs ../certs/*.pem ../certs/ICE-CA.pem: /O=European ICE-TEL project/OU=V3-Certification Authority error 10 at 1 depth lookup:Certificate has expired /O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt error 10 at 0 depth lookup:Certificate has expired OK ../certs/ICE-root.pem: /O=European ICE-TEL project/OU=V3-Certification Authority error 10 at 0 depth lookup:Certificate has expired OK ../certs/ICE-user.pem: /O=European ICE-TEL project/OU=V3-Certification Authority error 10 at 2 depth lookup:Certificate has expired /O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt error 10 at 1 depth lookup:Certificate has expired /O=European ICE-TEL project/OU=V3-Certification Authority/L=Darmstadt/CN=USER error 10 at 0 depth lookup:Certificate has expired OK ../certs/ca-cert.pem: OK ../certs/dsa-ca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=PCA error 10 at 1 depth lookup:Certificate has expired /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=CA error 10 at 0 depth lookup:Certificate has expired OK ../certs/dsa-pca.pem: /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=PCA error 10 at 0 depth lookup:Certificate has expired OK ../certs/factory.pem: /C=GB/O=UCL/OU=ICE-TEL Project/CN=TrustFactory error 10 at 0 depth lookup:Certificate has expired OK ../certs/nortelCA.pem: OK ../certs/pca-cert.pem: OK ../certs/rsa-cca.pem: /C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority error 10 at 0 depth lookup:Certificate has expired OK ../certs/rsa-ssca.pem: /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority error 18 at 0 depth lookup:self signed certificate /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority error 10 at 0 depth lookup:Certificate has expired OK ../certs/thawteCb.pem: OK ../certs/thawteCp.pem: OK ../certs/timCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty Ltd/OU=development/CN=CryptSoft Dev CA error 10 at 0 depth lookup:Certificate has expired OK ../certs/tjhCA.pem: /C=AU/ST=Queensland/L=Brisbane/O=CryptSoft Pty Ltd/OU=WORTHLESS CERTIFICATION AUTHORITIES/CN=ZERO VALUE CA - DEMONSTRATION PURPOSES ONLY error 10 at 0 depth lookup:Certificate has expired OK ../certs/vsign1.pem: OK ../certs/vsign2.pem: OK ../certs/vsign3.pem: OK ../certs/vsignss.pem: OK ../certs/vsigntca.pem: OK Generate a set of DH parameters ./dhtest ..+.+.+.+...+.+.++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++* p =D006C12BDC9A9447 g =5 pri 1=5E639A6E40FF1D9D pub 1=8C0C85FEB9C65F4 pri 2=66BD6E9314926949 pub 2=87F8F655C095C4C8 key1 =6CCD6F4787A9A361 key2 =6CCD6F4787A9A361 Generate a set of DSA parameters ./dsatest test generation of DSA parameters .++++++++++++++++++++++++++++++++++++++++++++++++++* ...+........+..+...+............+.+..+..........................................................................+++++++++++++++++++++++++++++++++++++++++++++++++++* seed D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3 counter=105 h=2 P: 00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68: 69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d: 78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac: 32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36: ee:31:c8:02:91 Q: 00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30: f4:8e:da:ce:91:5f G: 62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5: 00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce: 2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21: 92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53: e6:d7:88:02 ./dsatest -app2_1 test generation of DSA parameters .++++++++++++++++++++++++++++++++++++++++++++++++++* ...+........+..+...+............+.+..+..........................................................................+++++++++++++++++++++++++++++++++++++++++++++++++++* seed D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3 counter=105 h=2 P: 00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68: 69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d: 78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac: 32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36: ee:31:c8:02:91 Q: 00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30: f4:8e:da:ce:91:5f G: 62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5: 00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce: 2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21: 92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53: e6:d7:88:02 Generate and certify a test certificate make a certificate request using 'req' rsa Using configuration from CAss.cnf Generating a 512 bit RSA private key ...++++++++++++ ..............++++++++++++ writing new private key to 'keyCA.ss' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU Organization Name (eg, company) []:Dodgy Brothers Common Name (eg, YOUR name) []:Dodgy CA convert the certificate request into a self signed certificate using 'x509' Signature ok subject=/C=AU/O=Dodgy Brothers/CN=Dodgy CA Getting Private key convert a certificate into a certificate request using 'x509' Getting request Private Key Generating certificate request Using configuration from ../apps/openssl.cnf verify OK Using configuration from ../apps/openssl.cnf verify OK certCA.ss: OK make another certificate request using 'req' Using configuration from Uss.cnf Generating a 512 bit RSA private key ..........++++++++++++ .++++++++++++ writing new private key to 'keyU.ss' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU Organization Name (eg, company) []:Dodgy Brothers Common Name (eg, YOUR name) []:Brother 1 Common Name (eg, YOUR name) []:Brother 2 sign certificate request with the just created CA via 'x509' Signature ok subject=/C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 Getting CA Private Key certU.ss: OK Certificate details subject=/C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 issuer= /C=AU/O=Dodgy Brothers/CN=Dodgy CA notBefore=May 31 03:18:38 2000 GMT notAfter=Jun 30 03:18:38 2000 GMT The generated CA certificate is certCA.ss The generated CA private key is keyCA.ss The generated user certificate is certU.ss The generated user private key is keyU.ss rsa Generate and certify a test certificate via the 'ca' program CA certificate filename (or enter to create) Making CA certificate ... Using configuration from CAss.cnf Generating a 512 bit RSA private key ....................................................++++++++++++ ...++++++++++++ writing new private key to './demoCA/private/./cakey.pem' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU Organization Name (eg, company) []:Dodgy Brothers Common Name (eg, YOUR name) []:Dodgy CA Using configuration from Uss.cnf Generating a 512 bit RSA private key ....++++++++++++ .++++++++++++ writing new private key to 'newreq.pem' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU Organization Name (eg, company) []:Dodgy Brothers Common Name (eg, YOUR name) []:Brother 1 Common Name (eg, YOUR name) []:Brother 2 Request (and private key) is in newreq.pem Using configuration from ../apps/openssl.cnf Check that the request matches the signature Signature ok The Subjects Distinguished Name is as follows countryName :PRINTABLE:'AU' organizationName :PRINTABLE:'Dodgy Brothers' commonName :PRINTABLE:'Brother 1' commonName :PRINTABLE:'Brother 2' Certificate is to be certified until May 31 03:18:39 2001 GMT (365 days) Sign the certificate? [y/n]: 1 out of 1 certificate requests certified, commit? [y/n]Write out database with 1 new entries Data Base Updated Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: md5WithRSAEncryption Issuer: C=AU, O=Dodgy Brothers, CN=Dodgy CA Validity Not Before: May 31 03:18:39 2000 GMT Not After : May 31 03:18:39 2001 GMT Subject: C=AU, O=Dodgy Brothers, CN=Brother 1, CN=Brother 2 Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (512 bit) Modulus (512 bit): 00:bb:ec:e6:64:1d:65:aa:06:0f:4f:c7:f8:d6:99: 6c:b3:8a:62:fd:a5:34:cc:32:28:79:ab:ec:ef:86: 46:c6:93:04:32:a7:a9:3e:40:c2:8d:9e:43:d8:57: 42:ea:44:9b:a5:82:7c:70:9f:f7:02:54:43:d0:57: 7d:25:e6:8c:7b Exponent: 281479271743489 (0x1000100010001) X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Comment: OpenSSL Generated Certificate X509v3 Subject Key Identifier: 3D:44:99:54:54:59:B4:BA:9E:64:54:67:A1:40:9D:E6:E5:76:8F:AD X509v3 Authority Key Identifier: DirName:/C=AU/O=Dodgy Brothers/CN=Dodgy CA serial:00 Signature Algorithm: md5WithRSAEncryption 86:54:2e:da:98:57:e9:59:0e:30:a3:7d:c8:e0:58:70:13:c4: 9f:f6:02:36:6e:bf:80:05:3d:dd:cd:83:fe:e8:2c:d1:f9:ef: 65:ad:cf:71:73:04:33:4e:de:b2:c8:5d:50:60:dc:75:8e:f9: 5c:cd:1a:71:f2:41:eb:6b:62:76 -----BEGIN CERTIFICATE----- MIICJTCCAc+gAwIBAgIBATANBgkqhkiG9w0BAQQFADA5MQswCQYDVQQGEwJBVTEX MBUGA1UEChMORG9kZ3kgQnJvdGhlcnMxETAPBgNVBAMTCERvZGd5IENBMB4XDTAw MDUzMTAzMTgzOVoXDTAxMDUzMTAzMTgzOVowTjELMAkGA1UEBhMCQVUxFzAVBgNV BAoTDkRvZGd5IEJyb3RoZXJzMRIwEAYDVQQDEwlCcm90aGVyIDExEjAQBgNVBAMT CUJyb3RoZXIgMjBgMA0GCSqGSIb3DQEBAQUAA08AMEwCQQC77OZkHWWqBg9Px/jW mWyzimL9pTTMMih5q+zvhkbGkwQyp6k+QMKNnkPYV0LqRJulgnxwn/cCVEPQV30l 5ox7AgcBAAEAAQABo4GoMIGlMAkGA1UdEwQCMAAwLAYJYIZIAYb4QgENBB8WHU9w ZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQ9RJlUVFm0up5k VGehQJ3m5XaPrTBLBgNVHSMERDBCoT2kOzA5MQswCQYDVQQGEwJBVTEXMBUGA1UE ChMORG9kZ3kgQnJvdGhlcnMxETAPBgNVBAMTCERvZGd5IENBggEAMA0GCSqGSIb3 DQEBBAUAA0EAhlQu2phX6VkOMKN9yOBYcBPEn/YCNm6/gAU93c2D/ugs0fnvZa3P cXMEM07esshdUGDcdY75XM0acfJB62tidg== -----END CERTIFICATE----- Signed certificate is in newcert.pem newcert.pem: OK test SSL protocol test sslv2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with server authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with client authentication client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with both client and server authentication client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv3 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with server authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with client authentication client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with both client and server authentication client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with server authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with client authentication client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with both client and server authentication client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2 via BIO pair SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with server authentication via BIO pair server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with client authentication via BIO pair client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv2 with both client and server authentication via BIO pair client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA test sslv3 via BIO pair SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with server authentication via BIO pair server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with client authentication via BIO pair client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv3 with both client and server authentication via BIO pair client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 via BIO pair TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 w/o DHE via BIO pair TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with 1024bit DHE via BIO pair DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with server authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with client authentication via BIO pair client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test sslv2/sslv3 with both client and server authentication via BIO pair client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 512 bit RSA test tls1 with 1024bit anonymous DH, multiple handshakes DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 ADH-DES-CBC3-SHA 10 handshakes of 1 bytes done Approximate total server time: 0.11 s Approximate total client time: 0.60 s rsa test tls1 with 1024bit RSA, no DHE, multiple handshakes DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DES-CBC3-SHA, 1024 bit RSA 10 handshakes of 1 bytes done Approximate total server time: 0.11 s Approximate total client time: 0.40 s test tls1 with 1024bit RSA, 1024bit DHE, multiple handshakes DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 EDH-RSA-DES-CBC3-SHA, 1024 bit RSA 10 handshakes of 1 bytes done Approximate total server time: 0.21 s Approximate total client time: 0.59 s OpenSSL 0.9.5a 1 Apr 2000 built on: Tue May 30 22:07:06 CDT 2000 platform: irix64-mips4-cc options: bn(64,64) md2(int) rc4(ptr,char) des(idx,risc2,16,long) idea(int) blowfish(idx) compiler: cc -64 -mips4 -O2 -use_readonly_const -DTERMIOS -DB_ENDIAN -DBN_DIV3W [m[m[m[Jmorpheus# [K../apps/openssl genrsa -out k 1024 warning, not much extra random data, consider using the -rand option Generating RSA private key, 1024 bit long modulus ...............++++++ ......++++++ e is 281479271743489 (0x1000100010001) [m[m[m[Jmorpheus# [K script done on Tue May 30 22:19:43 2000 -- AKA: Philip Kizer <[EMAIL PROTECTED]> Texas A&M CIS Operating Systems Group, Unix ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]