Chris, I was able to use binaries you provided & also create my own set this time. Here's the output of the test.bat. Looks like it passed all tests. I ran in on 64 bit Win 2003 Server R2.
One thing I'm still struggling with is that I can't build the static libs for the 64 bit, can you? Thanks, Parind. Output from the test.bat >>> Microsoft Windows [Version 5.2.3790] (C) Copyright 1985-2003 Microsoft Corp. Z:\OpenSSL 0.9.8b Binaries\x64\out32dll>..\ms\test rsa_test PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok PKCS #1 v1.5 encryption/decryption ok OAEP encryption/decryption ok destest Doing cbcm Doing ecb Doing ede ecb Doing cbc Doing desx cbc Doing ede cbc Doing pcbc Doing cfb8 cfb16 cfb32 cfb48 cfb64 cfb64() ede_cfb64() done Doing ofb Doing ofb64 Doing ede_ofb64 Doing cbc_cksum Doing quad_cksum input word alignment test 0 1 2 3 output word alignment test 0 1 2 3 fast crypt test ideatest ecb idea ok cbc idea ok cfb64 idea ok bftest testing blowfish in raw ecb mode testing blowfish in ecb mode testing blowfish set_key testing blowfish in cbc mode testing blowfish in cfb64 mode testing blowfish in ofb64 shatest test 1 ok test 2 ok test 3 ok sha1test test 1 ok test 2 ok test 3 ok md5test test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test 6 ok test 7 ok md2test test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test 6 ok test 7 ok rc2test ecb RC2 ok rc4test test 0 ok test 1 ok test 2 ok test 3 ok test 4 ok test 5 ok test end processing ....................done test multi-call ....................done bulk test ok randtest test 1 done test 2 done test 3 done test 4 done dhtest .+.....+......+.++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++ *++*++*+ +*++*++*++*++*++* p =9C0CD96905812E67 g =5 pri 1=4325B4A7BEEADBAD pub 1=1AB4A86B70BDF115 pri 2=447B89F0A1F5E670 pub 2=339B2213012E763D key1 =26B3B5F404DB35AE key2 =26B3B5F404DB35AE exptest ........................................................................ ........ ........................................................................ ........ ........................................ done dsatest test generation of DSA parameters .++++++++++++++++++++++++++++++++++++++++++++++++++* ...+........+..+...+............+.+..+.................................. ........ ................................++++++++++++++++++++++++++++++++++++++++ ++++++++ +++* seed D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3 counter=105 h=2 P: 00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68: 69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d: 78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac: 32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36: ee:31:c8:02:91 Q: 00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30: f4:8e:da:ce:91:5f G: 62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5: 00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce: 2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21: 92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53: e6:d7:88:02 ectest Curve defined by Weierstrass equation y^2 = x^3 + a*x + b (mod 0x17) a = 0x1 b = 0x1 A cyclic subgroup: point at infinity x = 0xD, y = 0x7 x = 0x5, y = 0x4 x = 0x11, y = 0x3 x = 0x11, y = 0x14 x = 0x5, y = 0x13 x = 0xD, y = 0x10 Generator as octect string, compressed form: 030D Generator as octect string, uncompressed form: 040D07 Generator as octect string, hybrid form: 070D07 A representation of the inverse of that generator in Jacobian projective coordinates: X = 0xC, Y = 0xF, Z = 0xA SEC2 curve secp160r1 -- Generator: x = 0x4A96B5688EF573284664698968C38BB913CBFC82 y = 0x23A628553168947D59DCC912042351377AC5FB32 verify degree ... ok verify group order .... ok NIST curve P-192 -- Generator: x = 0x188DA80EB03090F67CBF20EB43A18800F4FF0AFD82FF1012 y = 0x7192B95FFC8DA78631011ED6B24CDD573F977A11E794811 verify degree ... ok verify group order .... ok NIST curve P-224 -- Generator: x = 0xB70E0CBD6BB4BF7F321390B94A03C1D356C21122343280D6115C1D21 y = 0xBD376388B5F723FB4C22DFE6CD4375A05A07476444D5819985007E34 verify degree ... ok verify group order .... ok NIST curve P-256 -- Generator: x = 0x6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296 y = 0x4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5 verify degree ... ok verify group order .... ok NIST curve P-384 -- Generator: x = 0xAA87CA22BE8B05378EB1C71EF320AD746E1D3B628BA79B9859F741E082542A385502F 25DBF55296C3A545E3872760AB7 y = 0x3617DE4A96262C6F5D9E98BF9292DC29F8F41DBD289A147CE9DA3113B5F0B8C00A60B 1CE1D7E819D7A431D7C90EA0E5F verify degree ... ok verify group order .... ok NIST curve P-521 -- Generator: x = 0xC6858E06B70404E9CD9E3ECB662395B4429C648139053FB521F828AF606B4D3DBAA14 B5E77EFE75928FE1DC127A2FFA8DE3348B3C1856A429BF97E7E31C2E5BD66 y = 0x11839296A789A3BC0045C8A5FB42C7D1BD998F54449579B446817AFBD17273E662C97 EE72995EF42640C550B9013FAD0761353C7086A272C24088BE94769FD16650 verify degree ... ok verify group order .... ok combined multiplication ..... ok Curve defined by Weierstrass equation y^2 + x*y = x^3 + a*x^2 + b (mod 0x13) a = 0x3 b = 0x1 (0x... means binary polynomial) A cyclic subgroup: point at infinity x = 0x6, y = 0x8 x = 0x1, y = 0xD x = 0x7, y = 0x2 x = 0x0, y = 0x1 x = 0x7, y = 0x5 x = 0x1, y = 0xC x = 0x6, y = 0xE Generator as octet string, uncompressed form: 040608 NIST curve K-163 -- Generator: x = 0x2FE13C0537BBC11ACAA07D793DE4E6D5E5C94EEE8 y = 0x289070FB05D38FF58321F2E800536D538CCDAA3D9 verify degree ... ok verify group order .... ok NIST curve B-163 -- Generator: x = 0x3F0EBA16286A2D57EA0991168D4994637E8343E36 y = 0xD51FBC6C71A0094FA2CDD545B11C5C0C797324F1 verify degree ... ok verify group order .... ok NIST curve K-233 -- Generator: x = 0x17232BA853A7E731AF129F22FF4149563A419C26BF50A4C9D6EEFAD6126 y = 0x1DB537DECE819B7F70F555A67C427A8CD9BF18AEB9B56E0C11056FAE6A3 verify degree ... ok verify group order .... ok NIST curve B-233 -- Generator: x = 0xFAC9DFCBAC8313BB2139F1BB755FEF65BC391F8B36F8F8EB7371FD558B y = 0x1006A08A41903350678E58528BEBF8A0BEFF867A7CA36716F7E01F81052 verify degree ... ok verify group order .... ok NIST curve K-283 -- Generator: x = 0x503213F78CA44883F1A3B8162F188E553CD265F23C1567A16876913B0C2AC24584928 36 y = 0x1CCDA380F1C9E318D90F95D07E5426FE87E45C0E8184698E45962364E34116177DD22 59 verify degree ... ok verify group order .... ok NIST curve B-283 -- Generator: x = 0x5F939258DB7DD90E1934F8C70B0DFEC2EED25B8557EAC9C80E2E198F8CDBECD86B120 53 y = 0x3676854FE24141CB98FE6D4B20D02B4516FF702350EDDB0826779C813F0DF45BE8112 F4 verify degree ... ok verify group order .... ok NIST curve K-409 -- Generator: x = 0x60F05F658F49C1AD3AB1890F7184210EFD0987E307C84C27ACCFB8F9F67CC2C460189 EB5AAAA62EE222EB1B35540CFE9023746 y = 0x1E369050B7C4E42ACBA1DACBF04299C3460782F918EA427E6325165E9EA10E3DA5F6C 42E9C55215AA9CA27A5863EC48D8E0286B verify degree ... ok verify group order .... ok NIST curve B-409 -- Generator: x = 0x15D4860D088DDB3496B0C6064756260441CDE4AF1771D4DB01FFE5B34E59703DC255A 868A1180515603AEAB60794E54BB7996A7 y = 0x61B1CFAB6BE5F32BBFA78324ED106A7636B9C5A7BD198D0158AA4F5488D08F38514F1 FDF4B4F40D2181B3681C364BA0273C706 verify degree ... ok verify group order .... ok NIST curve K-571 -- Generator: x = 0x26EB7A859923FBC82189631F8103FE4AC9CA2970012D5D46024804801841CA4437095 8493B205E647DA304DB4CEB08CBBD1BA39494776FB988B47174DCA88C7E2945283A01C89 72 y = 0x349DC807F4FBF374F4AEADE3BCA95314DD58CEC9F307A54FFC61EFC006D8A2C9D4979 C0AC44AEA74FBEBBB9F772AEDCB620B01A7BA7AF1B320430C8591984F601CD4C143EF1C7 A3 verify degree ... ok verify group order .... ok NIST curve B-571 -- Generator: x = 0x303001D34B856296C16C0D40D3CD7750A93D1D2955FA80AA5F40FC8DB7B2ABDBDE539 50F4C0D293CDD711A35B67FB1499AE60038614F1394ABFA3B4C850D927E1E7769C8EEC2D 19 y = 0x37BF27342DA639B6DCCFFFEB73D69D78C6C27A6009CBBCA1980F8533921E8A684423E 43BAB08A576291AF8F461BB2A8B3531D2F0485C19B16E2F1516E23DD3C1A4827AF1B8AC1 5B verify degree ... ok verify group order .... ok combined multiplication ..... ok testing internal curves: ....................................................... ............ ok testenc start testenc Z:\OpenSSL 0.9.8b Binaries\x64\out32dll test enc test base64 enc test rc4 test base64 rc4 test des-cfb test base64 des-cfb test des-ede-cfb test base64 des-ede-cfb test des-ede3-cfb test base64 des-ede3-cfb test des-ofb test base64 des-ofb test des-ede-ofb test base64 des-ede-ofb test des-ede3-ofb test base64 des-ede3-ofb test des-ecb test base64 des-ecb test des-ede test base64 des-ede test des-ede3 test base64 des-ede3 test des-cbc test base64 des-cbc test des-ede-cbc test base64 des-ede-cbc test des-ede3-cbc test base64 des-ede3-cbc test idea-ecb test base64 idea-ecb test idea-cfb test base64 idea-cfb test idea-ofb test base64 idea-ofb test idea-cbc test base64 idea-cbc test rc2-ecb test base64 rc2-ecb test rc2-cfb test base64 rc2-cfb test rc2-ofb test base64 rc2-ofb test rc2-cbc test base64 rc2-cbc test bf-ecb test base64 bf-ecb test bf-cfb test base64 bf-cfb test bf-ofb test base64 bf-ofb test bf-cbc test base64 bf-cbc OK testpem test crl ..\test\testcrl.pem Comparing files ..\TEST\testcrl.pem and PEM.OUT FC: no differences encountered test pkcs7 ..\test\testp7.pem Comparing files ..\TEST\testp7.pem and PEM.OUT FC: no differences encountered test req ..\test\testreq2.pem Comparing files ..\TEST\testreq2.pem and PEM.OUT FC: no differences encountered test rsa ..\test\testrsa.pem writing RSA key Comparing files ..\TEST\testrsa.pem and PEM.OUT FC: no differences encountered test x509 ..\test\testx509.pem Comparing files ..\TEST\testx509.pem and PEM.OUT FC: no differences encountered test x509 ..\test\v3-cert1.pem Comparing files ..\TEST\v3-cert1.pem and PEM.OUT FC: no differences encountered test x509 ..\test\v3-cert1.pem Comparing files ..\TEST\v3-cert1.pem and PEM.OUT FC: no differences encountered test sess_id ..\test\testsid.pem Comparing files ..\TEST\testsid.pem and PEM.OUT FC: no differences encountered OK verify ..\certs\argena.pem: OK ..\certs\argeng.pem: OK ..\certs\eng1.pem: OK ..\certs\eng2.pem: OK ..\certs\eng3.pem: OK ..\certs\eng4.pem: OK ..\certs\eng5.pem: OK ..\certs\RegTP-5R.pem: /C=DE/O=Regulierungsbeh\xC8orde f\xC8ur Telekommunikation und Post/0.2.262.1.10.7.20=1/CN=5R-CA 1:PN error 10 at 0 depth lookup:certificate has expired OK ..\certs\RegTP-6R.pem: /C=DE/O=Regulierungsbeh\xC8orde f\xC8ur Telekommunikation und Post/0.2.262.1.10.7.20=1/CN=6R-Ca 1:PN error 10 at 0 depth lookup:certificate has expired OK ..\certs\thawteCb.pem: OK ..\certs\thawteCp.pem: OK ..\certs\vsign1.pem: OK ..\certs\vsign3.pem: OK ..\certs\vsignss.pem: OK ..\certs\wellsfgo.pem: OK testss make a certificate request using 'req' Loading 'screen' into random state - done Generating a 512 bit RSA private key ...................++++++++++++ ...++++++++++++ writing new private key to 'keyCA.ss' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU Organization Name (eg, company) []:Dodgy Brothers Common Name (eg, YOUR name) []:Dodgy CA convert the certificate request into a self signed certificate using 'x509' Loading 'screen' into random state - done Signature ok subject=/C=AU/O=Dodgy Brothers/CN=Dodgy CA Getting Private key -- convert a certificate into a certificate request using 'x509' Loading 'screen' into random state - done Getting request Private Key Generating certificate request verify OK verify OK certCA.ss: OK -- make another certificate request using 'req' Loading 'screen' into random state - done Generating a 512 bit RSA private key .......++++++++++++ ...++++++++++++ writing new private key to 'keyU.ss' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:AU Organization Name (eg, company) []:Dodgy Brothers Common Name (eg, YOUR name) []:Brother 1 Common Name (eg, YOUR name) []:Brother 2 -- sign certificate request with the just created CA via 'x509' Loading 'screen' into random state - done Signature ok subject=/C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 Getting CA Private Key certU.ss: OK -- Certificate details subject= /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 issuer= /C=AU/O=Dodgy Brothers/CN=Dodgy CA notBefore=May 11 15:12:27 2006 GMT notAfter=Jun 10 15:12:27 2006 GMT Everything appeared to work -- The generated CA certificate is certCA.ss The generated CA private key is keyCA.ss The current CA signing serial number is in certCA.srl The generated user certificate is certU.ss The generated user private key is keyU.ss -- test sslv2 Available compression methods: NONE SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA 1 handshakes of 256 bytes done test sslv2 with server authentication Available compression methods: NONE server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA 1 handshakes of 256 bytes done test sslv2 with client authentication Available compression methods: NONE client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA 1 handshakes of 256 bytes done test sslv2 with both client and server authentication Available compression methods: NONE client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA 1 handshakes of 256 bytes done test sslv3 Available compression methods: NONE SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv3 with server authentication Available compression methods: NONE server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv3 with client authentication Available compression methods: NONE client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv3 with both client and server authentication Available compression methods: NONE client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv2/sslv3 Available compression methods: NONE TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv2/sslv3 with server authentication Available compression methods: NONE server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv2/sslv3 with client authentication Available compression methods: NONE client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv2/sslv3 with both client and server authentication Available compression methods: NONE client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv2 via BIO pair Available compression methods: NONE SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA 1 handshakes of 256 bytes done test sslv2/sslv3 with 1024 bit DHE via BIO pair Available compression methods: NONE DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv2 with server authentication via BIO pair Available compression methods: NONE server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA 1 handshakes of 256 bytes done test sslv2 with client authentication via BIO pair Available compression methods: NONE client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA 1 handshakes of 256 bytes done test sslv2 with both client and server authentication via BIO pair Available compression methods: NONE client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA 1 handshakes of 256 bytes done test sslv3 via BIO pair Available compression methods: NONE SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv3 with server authentication via BIO pair Available compression methods: NONE server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv3 with client authentication via BIO pair Available compression methods: NONE client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv3 with both client and server authentication via BIO pair Available compression methods: NONE client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv2/sslv3 via BIO pair Available compression methods: NONE TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv2/sslv3 with server authentication Available compression methods: NONE server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv2/sslv3 with client authentication via BIO pair Available compression methods: NONE client authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done test sslv2/sslv3 with both client and server authentication via BIO pair Available compression methods: NONE client authentication server authentication depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2 TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA 1 handshakes of 256 bytes done passed all tests Z:\OpenSSL 0.9.8b Binaries\x64\out32dll> -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Parind Shah Sent: Wednesday, May 10, 2006 9:56 AM To: openssl-users@openssl.org Subject: RE: 0.9.8b windows binaries Chris, I really appreciate you taking time to build 64 bit binaries. I'll try to use it and get back to you. Many thanks in advance, Parind. -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of hunter Sent: Wednesday, May 10, 2006 1:45 AM To: openssl-users@openssl.org Subject: Re: 0.9.8b windows binaries On 5/8/06, Parind Shah <[EMAIL PROTECTED]> wrote: > > Is it possible to include 64 bit binaries as well? > > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Wai Wu > Sent: Monday, May 08, 2006 11:12 AM > To: openssl-users@openssl.org > Subject: RE: 0.9.8b windows binaries > > Yes. Please hunter. Please include the header files in the download. > Also, a small request, can you provide a build for static linking? > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of hunter > Sent: Sunday, May 07, 2006 12:56 PM > To: openssl-users@openssl.org > Subject: Re: 0.9.8b windows binaries > > On 5/7/06, Mike Ehlert <[EMAIL PROTECTED]> wrote: > > Oops. looks like I sent a blank reply to the list earlier this > morning. > > My apologies to all. > > > > >> Hummm. I downloaded the binary from http://hunter.campbus.com/, > > > > I was going to comment that this site does not offer the 0.9.8b > > binaries, but what I'm after now is some information on any tricks > > to compiling the DLL's with only the features needed for my > > application to reduce their size. I'd rather not try to blindly rip > > appart the source without some guidance as I am not a C++ coder, my > > former coding > > > skills were limited to masm. > > > > Regards, Mike > > > > ______________________________________________________________________ > > OpenSSL Project http://www.openssl.org > > User Support Mailing List openssl-users@openssl.org > > Automated List Manager [EMAIL PROTECTED] > > > Mike, > > I provide the binaries for hunter.campbus.com. The files are actually > stored at brandleadershipmarketing.com/apache. You can take the > Archive and MD5 link from hunter.campbus.com. > > I have been busy and have not had time to build Openssl-0.9.8b. I will > be getting to the Apache builds in the next few days but I thought I > would try to address your issue - smaller binaries. I assume you also > need headers and libs for building your application. I will be waiting > for an update to mod_ssl for Apache 1.3.x. > > I noticed an option for the build to not statically link the engines. > This results in binaries that are a little smaller. I built the code > with 'no-static-engine' and used the 'install' option. Then I zipped > up the directory structure created by the makefile in c:\openssl. The > engine dll's can be found in the c:\openssl\lib\engines directory. > > Openssl-0.9.8b-no-static-engine-Win32.zip > > Try this build and let me know if it suits your needs. If it does I > will continue the build the updates in this form in addition to the > regular package, which is created to support Apache 1.3.x. Apache > 2.x.x are packaged with OpenSSL included. > > If you prefer you can build your own using these options, but let me > know so that I know if should continue to provide this form of package. > > Chris Lewis > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List openssl-users@openssl.org > Automated List Manager [EMAIL PROTECTED] > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List openssl-users@openssl.org > Automated List Manager [EMAIL PROTECTED] > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List openssl-users@openssl.org > Automated List Manager [EMAIL PROTECTED] > Parind, I built 64 bit binaries. Openssl-0.9.8b-Win64-ia64.zip Openssl-0.9.8b-Win64-x64.zip at http://brandleadershipmarketing.com/apache I zipped up the entire build directory because I cannot test these. If they are ok I will figure out what parts to package. Your feed back would be appreciated. Chris. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED] ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED] ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]