Chris,

I was able to use binaries you provided & also create my own set this
time. Here's the output of the test.bat. Looks like it passed all tests.
I ran in on 64 bit Win 2003 Server R2.

One thing I'm still struggling with is that I can't build the static
libs for the 64 bit, can you?

Thanks,
Parind.

Output from the test.bat >>>

Microsoft Windows [Version 5.2.3790]
(C) Copyright 1985-2003 Microsoft Corp.


Z:\OpenSSL 0.9.8b Binaries\x64\out32dll>..\ms\test
rsa_test
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
destest
Doing cbcm
Doing ecb
Doing ede ecb
Doing cbc
Doing desx cbc
Doing ede cbc
Doing pcbc
Doing cfb8 cfb16 cfb32 cfb48 cfb64 cfb64() ede_cfb64() done
Doing ofb
Doing ofb64
Doing ede_ofb64
Doing cbc_cksum
Doing quad_cksum
input word alignment test 0 1 2 3
output word alignment test 0 1 2 3
fast crypt test
ideatest
ecb idea ok
cbc idea ok
cfb64 idea ok
bftest
testing blowfish in raw ecb mode
testing blowfish in ecb mode
testing blowfish set_key
testing blowfish in cbc mode
testing blowfish in cfb64 mode
testing blowfish in ofb64
shatest
test 1 ok
test 2 ok
test 3 ok
sha1test
test 1 ok
test 2 ok
test 3 ok
md5test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
md2test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
rc2test
ecb RC2 ok
rc4test
test 0 ok
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test end processing ....................done
test multi-call ....................done
bulk test ok
randtest
test 1 done
test 2 done
test 3 done
test 4 done
dhtest
.+.....+......+.++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++
*++*++*+
+*++*++*++*++*++*

p    =9C0CD96905812E67
g    =5
pri 1=4325B4A7BEEADBAD
pub 1=1AB4A86B70BDF115
pri 2=447B89F0A1F5E670
pub 2=339B2213012E763D
key1 =26B3B5F404DB35AE
key2 =26B3B5F404DB35AE
exptest
........................................................................
........
........................................................................
........
........................................ done
dsatest
test generation of DSA parameters
.++++++++++++++++++++++++++++++++++++++++++++++++++*
...+........+..+...+............+.+..+..................................
........
................................++++++++++++++++++++++++++++++++++++++++
++++++++
+++*
seed
D5014E4B 60EF2BA8 B6211B40 62BA3224 E0427DD3
counter=105 h=2
P:
    00:8d:f2:a4:94:49:22:76:aa:3d:25:75:9b:b0:68:
    69:cb:ea:c0:d8:3a:fb:8d:0c:f7:cb:b8:32:4f:0d:
    78:82:e5:d0:76:2f:c5:b7:21:0e:af:c2:e9:ad:ac:
    32:ab:7a:ac:49:69:3d:fb:f8:37:24:c2:ec:07:36:
    ee:31:c8:02:91
Q:
    00:c7:73:21:8c:73:7e:c8:ee:99:3b:4f:2d:ed:30:
    f4:8e:da:ce:91:5f
G:
    62:6d:02:78:39:ea:0a:13:41:31:63:a5:5b:4c:b5:
    00:29:9d:55:22:95:6c:ef:cb:3b:ff:10:f3:99:ce:
    2c:2e:71:cb:9d:e5:fa:24:ba:bf:58:e5:b7:95:21:
    92:5c:9c:c4:2e:9f:6f:46:4b:08:8c:c5:72:af:53:
    e6:d7:88:02
ectest
Curve defined by Weierstrass equation
     y^2 = x^3 + a*x + b  (mod 0x17)
     a = 0x1
     b = 0x1
A cyclic subgroup:
     point at infinity
     x = 0xD, y = 0x7
     x = 0x5, y = 0x4
     x = 0x11, y = 0x3
     x = 0x11, y = 0x14
     x = 0x5, y = 0x13
     x = 0xD, y = 0x10
Generator as octect string, compressed form:
     030D
Generator as octect string, uncompressed form:
     040D07
Generator as octect string, hybrid form:
     070D07
A representation of the inverse of that generator in
Jacobian projective coordinates:
     X = 0xC, Y = 0xF, Z = 0xA

SEC2 curve secp160r1 -- Generator:
     x = 0x4A96B5688EF573284664698968C38BB913CBFC82
     y = 0x23A628553168947D59DCC912042351377AC5FB32
verify degree ... ok
verify group order .... ok

NIST curve P-192 -- Generator:
     x = 0x188DA80EB03090F67CBF20EB43A18800F4FF0AFD82FF1012
     y = 0x7192B95FFC8DA78631011ED6B24CDD573F977A11E794811
verify degree ... ok
verify group order .... ok

NIST curve P-224 -- Generator:
     x = 0xB70E0CBD6BB4BF7F321390B94A03C1D356C21122343280D6115C1D21
     y = 0xBD376388B5F723FB4C22DFE6CD4375A05A07476444D5819985007E34
verify degree ... ok
verify group order .... ok

NIST curve P-256 -- Generator:
     x =
0x6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296
     y =
0x4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5
verify degree ... ok
verify group order .... ok

NIST curve P-384 -- Generator:
     x =
0xAA87CA22BE8B05378EB1C71EF320AD746E1D3B628BA79B9859F741E082542A385502F
25DBF55296C3A545E3872760AB7
     y =
0x3617DE4A96262C6F5D9E98BF9292DC29F8F41DBD289A147CE9DA3113B5F0B8C00A60B
1CE1D7E819D7A431D7C90EA0E5F
verify degree ... ok
verify group order .... ok

NIST curve P-521 -- Generator:
     x =
0xC6858E06B70404E9CD9E3ECB662395B4429C648139053FB521F828AF606B4D3DBAA14
B5E77EFE75928FE1DC127A2FFA8DE3348B3C1856A429BF97E7E31C2E5BD66
     y =
0x11839296A789A3BC0045C8A5FB42C7D1BD998F54449579B446817AFBD17273E662C97
EE72995EF42640C550B9013FAD0761353C7086A272C24088BE94769FD16650
verify degree ... ok
verify group order .... ok
combined multiplication ..... ok


Curve defined by Weierstrass equation
     y^2 + x*y = x^3 + a*x^2 + b  (mod 0x13)
     a = 0x3
     b = 0x1
(0x... means binary polynomial)
A cyclic subgroup:
     point at infinity
     x = 0x6, y = 0x8
     x = 0x1, y = 0xD
     x = 0x7, y = 0x2
     x = 0x0, y = 0x1
     x = 0x7, y = 0x5
     x = 0x1, y = 0xC
     x = 0x6, y = 0xE

Generator as octet string, uncompressed form:
     040608

NIST curve K-163 -- Generator:
     x = 0x2FE13C0537BBC11ACAA07D793DE4E6D5E5C94EEE8
     y = 0x289070FB05D38FF58321F2E800536D538CCDAA3D9
verify degree ... ok
verify group order .... ok

NIST curve B-163 -- Generator:
     x = 0x3F0EBA16286A2D57EA0991168D4994637E8343E36
     y = 0xD51FBC6C71A0094FA2CDD545B11C5C0C797324F1
verify degree ... ok
verify group order .... ok

NIST curve K-233 -- Generator:
     x = 0x17232BA853A7E731AF129F22FF4149563A419C26BF50A4C9D6EEFAD6126
     y = 0x1DB537DECE819B7F70F555A67C427A8CD9BF18AEB9B56E0C11056FAE6A3
verify degree ... ok
verify group order .... ok

NIST curve B-233 -- Generator:
     x = 0xFAC9DFCBAC8313BB2139F1BB755FEF65BC391F8B36F8F8EB7371FD558B
     y = 0x1006A08A41903350678E58528BEBF8A0BEFF867A7CA36716F7E01F81052
verify degree ... ok
verify group order .... ok

NIST curve K-283 -- Generator:
     x =
0x503213F78CA44883F1A3B8162F188E553CD265F23C1567A16876913B0C2AC24584928
36
     y =
0x1CCDA380F1C9E318D90F95D07E5426FE87E45C0E8184698E45962364E34116177DD22
59
verify degree ... ok
verify group order .... ok

NIST curve B-283 -- Generator:
     x =
0x5F939258DB7DD90E1934F8C70B0DFEC2EED25B8557EAC9C80E2E198F8CDBECD86B120
53
     y =
0x3676854FE24141CB98FE6D4B20D02B4516FF702350EDDB0826779C813F0DF45BE8112
F4
verify degree ... ok
verify group order .... ok

NIST curve K-409 -- Generator:
     x =
0x60F05F658F49C1AD3AB1890F7184210EFD0987E307C84C27ACCFB8F9F67CC2C460189
EB5AAAA62EE222EB1B35540CFE9023746
     y =
0x1E369050B7C4E42ACBA1DACBF04299C3460782F918EA427E6325165E9EA10E3DA5F6C
42E9C55215AA9CA27A5863EC48D8E0286B
verify degree ... ok
verify group order .... ok

NIST curve B-409 -- Generator:
     x =
0x15D4860D088DDB3496B0C6064756260441CDE4AF1771D4DB01FFE5B34E59703DC255A
868A1180515603AEAB60794E54BB7996A7
     y =
0x61B1CFAB6BE5F32BBFA78324ED106A7636B9C5A7BD198D0158AA4F5488D08F38514F1
FDF4B4F40D2181B3681C364BA0273C706
verify degree ... ok
verify group order .... ok

NIST curve K-571 -- Generator:
     x =
0x26EB7A859923FBC82189631F8103FE4AC9CA2970012D5D46024804801841CA4437095
8493B205E647DA304DB4CEB08CBBD1BA39494776FB988B47174DCA88C7E2945283A01C89
72
     y =
0x349DC807F4FBF374F4AEADE3BCA95314DD58CEC9F307A54FFC61EFC006D8A2C9D4979
C0AC44AEA74FBEBBB9F772AEDCB620B01A7BA7AF1B320430C8591984F601CD4C143EF1C7
A3
verify degree ... ok
verify group order .... ok

NIST curve B-571 -- Generator:
     x =
0x303001D34B856296C16C0D40D3CD7750A93D1D2955FA80AA5F40FC8DB7B2ABDBDE539
50F4C0D293CDD711A35B67FB1499AE60038614F1394ABFA3B4C850D927E1E7769C8EEC2D
19
     y =
0x37BF27342DA639B6DCCFFFEB73D69D78C6C27A6009CBBCA1980F8533921E8A684423E
43BAB08A576291AF8F461BB2A8B3531D2F0485C19B16E2F1516E23DD3C1A4827AF1B8AC1
5B
verify degree ... ok
verify group order .... ok
combined multiplication ..... ok

testing internal curves:
.......................................................
............ ok
testenc
start testenc
Z:\OpenSSL 0.9.8b Binaries\x64\out32dll
test enc
test base64 enc
test rc4
test base64 rc4
test des-cfb
test base64 des-cfb
test des-ede-cfb
test base64 des-ede-cfb
test des-ede3-cfb
test base64 des-ede3-cfb
test des-ofb
test base64 des-ofb
test des-ede-ofb
test base64 des-ede-ofb
test des-ede3-ofb
test base64 des-ede3-ofb
test des-ecb
test base64 des-ecb
test des-ede
test base64 des-ede
test des-ede3
test base64 des-ede3
test des-cbc
test base64 des-cbc
test des-ede-cbc
test base64 des-ede-cbc
test des-ede3-cbc
test base64 des-ede3-cbc
test idea-ecb
test base64 idea-ecb
test idea-cfb
test base64 idea-cfb
test idea-ofb
test base64 idea-ofb
test idea-cbc
test base64 idea-cbc
test rc2-ecb
test base64 rc2-ecb
test rc2-cfb
test base64 rc2-cfb
test rc2-ofb
test base64 rc2-ofb
test rc2-cbc
test base64 rc2-cbc
test bf-ecb
test base64 bf-ecb
test bf-cfb
test base64 bf-cfb
test bf-ofb
test base64 bf-ofb
test bf-cbc
test base64 bf-cbc
OK
testpem
test crl ..\test\testcrl.pem
Comparing files ..\TEST\testcrl.pem and PEM.OUT
FC: no differences encountered

test pkcs7 ..\test\testp7.pem
Comparing files ..\TEST\testp7.pem and PEM.OUT
FC: no differences encountered

test req ..\test\testreq2.pem
Comparing files ..\TEST\testreq2.pem and PEM.OUT
FC: no differences encountered

test rsa ..\test\testrsa.pem
writing RSA key
Comparing files ..\TEST\testrsa.pem and PEM.OUT
FC: no differences encountered

test x509 ..\test\testx509.pem
Comparing files ..\TEST\testx509.pem and PEM.OUT
FC: no differences encountered

test x509 ..\test\v3-cert1.pem
Comparing files ..\TEST\v3-cert1.pem and PEM.OUT
FC: no differences encountered

test x509 ..\test\v3-cert1.pem
Comparing files ..\TEST\v3-cert1.pem and PEM.OUT
FC: no differences encountered

test sess_id ..\test\testsid.pem
Comparing files ..\TEST\testsid.pem and PEM.OUT
FC: no differences encountered

OK
verify
..\certs\argena.pem: OK
..\certs\argeng.pem: OK
..\certs\eng1.pem: OK
..\certs\eng2.pem: OK
..\certs\eng3.pem: OK
..\certs\eng4.pem: OK
..\certs\eng5.pem: OK
..\certs\RegTP-5R.pem: /C=DE/O=Regulierungsbeh\xC8orde f\xC8ur
Telekommunikation
 und Post/0.2.262.1.10.7.20=1/CN=5R-CA 1:PN
error 10 at 0 depth lookup:certificate has expired
OK
..\certs\RegTP-6R.pem: /C=DE/O=Regulierungsbeh\xC8orde f\xC8ur
Telekommunikation
 und Post/0.2.262.1.10.7.20=1/CN=6R-Ca 1:PN
error 10 at 0 depth lookup:certificate has expired
OK
..\certs\thawteCb.pem: OK
..\certs\thawteCp.pem: OK
..\certs\vsign1.pem: OK
..\certs\vsign3.pem: OK
..\certs\vsignss.pem: OK
..\certs\wellsfgo.pem: OK
testss
make a certificate request using 'req'
Loading 'screen' into random state - done
Generating a 512 bit RSA private key
...................++++++++++++
...++++++++++++
writing new private key to 'keyCA.ss'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a
DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Dodgy CA
convert the certificate request into a self signed certificate using
'x509'
Loading 'screen' into random state - done
Signature ok
subject=/C=AU/O=Dodgy Brothers/CN=Dodgy CA
Getting Private key
--
convert a certificate into a certificate request using 'x509'
Loading 'screen' into random state - done
Getting request Private Key
Generating certificate request
verify OK
verify OK
certCA.ss: OK
--
make another certificate request using 'req'
Loading 'screen' into random state - done
Generating a 512 bit RSA private key
.......++++++++++++
...++++++++++++
writing new private key to 'keyU.ss'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a
DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:AU
Organization Name (eg, company) []:Dodgy Brothers
Common Name (eg, YOUR name) []:Brother 1
Common Name (eg, YOUR name) []:Brother 2
--
sign certificate request with the just created CA via 'x509'
Loading 'screen' into random state - done
Signature ok
subject=/C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
Getting CA Private Key
certU.ss: OK
--
Certificate details
subject= /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
issuer= /C=AU/O=Dodgy Brothers/CN=Dodgy CA
notBefore=May 11 15:12:27 2006 GMT
notAfter=Jun 10 15:12:27 2006 GMT
Everything appeared to work
--
The generated CA certificate is certCA.ss
The generated CA private key is keyCA.ss
The current CA signing serial number is in certCA.srl
The generated user certificate is certU.ss
The generated user private key is keyU.ss
--
test sslv2
Available compression methods:
  NONE
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2 with server authentication
Available compression methods:
  NONE
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2 with client authentication
Available compression methods:
  NONE
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2 with both client and server authentication
Available compression methods:
  NONE
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
1 handshakes of 256 bytes done
test sslv3
Available compression methods:
  NONE
SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv3 with server authentication
Available compression methods:
  NONE
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv3 with client authentication
Available compression methods:
  NONE
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv3 with both client and server authentication
Available compression methods:
  NONE
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2/sslv3
Available compression methods:
  NONE
TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2/sslv3 with server authentication
Available compression methods:
  NONE
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2/sslv3 with client authentication
Available compression methods:
  NONE
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2/sslv3 with both client and server authentication
Available compression methods:
  NONE
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2 via BIO pair
Available compression methods:
  NONE
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2/sslv3 with 1024 bit DHE via BIO pair
Available compression methods:
  NONE
DONE via BIO pair: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit
RSA
1 handshakes of 256 bytes done
test sslv2 with server authentication via BIO pair
Available compression methods:
  NONE
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2 with client authentication via BIO pair
Available compression methods:
  NONE
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2 with both client and server authentication via BIO pair
Available compression methods:
  NONE
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv2, cipher SSLv2 DES-CBC3-MD5, 512 bit RSA
1 handshakes of 256 bytes done
test sslv3 via BIO pair
Available compression methods:
  NONE
SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv3 with server authentication via BIO pair
Available compression methods:
  NONE
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv3 with client authentication  via BIO pair
Available compression methods:
  NONE
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv3 with both client and server authentication via BIO pair
Available compression methods:
  NONE
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2/sslv3 via BIO pair
Available compression methods:
  NONE
TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2/sslv3 with server authentication
Available compression methods:
  NONE
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2/sslv3 with client authentication via BIO pair
Available compression methods:
  NONE
client authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
test sslv2/sslv3 with both client and server authentication via BIO pair
Available compression methods:
  NONE
client authentication
server authentication
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
depth=1 /C=AU/O=Dodgy Brothers/CN=Dodgy CA
depth=0 /C=AU/O=Dodgy Brothers/CN=Brother 1/CN=Brother 2
TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 512 bit RSA
1 handshakes of 256 bytes done
passed all tests

Z:\OpenSSL 0.9.8b Binaries\x64\out32dll>


 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Parind Shah
Sent: Wednesday, May 10, 2006 9:56 AM
To: openssl-users@openssl.org
Subject: RE: 0.9.8b windows binaries

 
Chris,

I really appreciate you taking time to build 64 bit binaries. I'll try
to use it and get back to you.

Many thanks in advance,
Parind. 

 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of hunter
Sent: Wednesday, May 10, 2006 1:45 AM
To: openssl-users@openssl.org
Subject: Re: 0.9.8b windows binaries

On 5/8/06, Parind Shah <[EMAIL PROTECTED]> wrote:
>
> Is it possible to include 64 bit binaries as well?
>
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Wai Wu
> Sent: Monday, May 08, 2006 11:12 AM
> To: openssl-users@openssl.org
> Subject: RE: 0.9.8b windows binaries
>
> Yes. Please hunter. Please include the header files in the download.
> Also, a small request, can you provide a build for static linking?
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of hunter
> Sent: Sunday, May 07, 2006 12:56 PM
> To: openssl-users@openssl.org
> Subject: Re: 0.9.8b windows binaries
>
> On 5/7/06, Mike Ehlert <[EMAIL PROTECTED]> wrote:
> > Oops. looks like I sent a blank reply to the list earlier this
> morning.
> > My apologies to all.
> >
> > >> Hummm. I downloaded the binary from http://hunter.campbus.com/,
> >
> > I was going to comment that this site does not offer the 0.9.8b 
> > binaries, but what I'm after now is some information on any tricks 
> > to compiling the DLL's with only the features needed for my 
> > application to reduce their size. I'd rather not try to blindly rip 
> > appart the source without some guidance as I am not a C++ coder, my 
> > former coding
>
> > skills were limited to masm.
> >
> > Regards,  Mike
> >
> >
______________________________________________________________________
> > OpenSSL Project
http://www.openssl.org
> > User Support Mailing List
openssl-users@openssl.org
> > Automated List Manager
[EMAIL PROTECTED]
> >
> Mike,
>
> I provide the binaries for hunter.campbus.com. The files are actually 
> stored at brandleadershipmarketing.com/apache. You can take the 
> Archive and MD5 link from hunter.campbus.com.
>
> I have been busy and have not had time to build Openssl-0.9.8b. I will

> be getting to the Apache builds in the next few days but I thought I 
> would try to address your issue - smaller binaries. I assume you also 
> need headers and libs for building your application. I will be waiting

> for an update to mod_ssl for Apache 1.3.x.
>
> I noticed an option for the build to not statically link the engines.
> This results in binaries that are a little smaller. I built the code 
> with 'no-static-engine' and used the 'install' option. Then I zipped 
> up the directory structure created by the makefile in c:\openssl. The 
> engine dll's can be found in the c:\openssl\lib\engines directory.
>
> Openssl-0.9.8b-no-static-engine-Win32.zip
>
> Try this build and let me know if it suits your needs. If it does I 
> will continue the build the updates in this form in addition to the 
> regular package, which is created to support Apache 1.3.x. Apache 
> 2.x.x are packaged with OpenSSL included.
>
> If you prefer you can build your own using these options, but let me 
> know so that I know if should continue to provide this form of
package.
>
> Chris Lewis
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>
Parind,

I built 64 bit binaries.

Openssl-0.9.8b-Win64-ia64.zip
Openssl-0.9.8b-Win64-x64.zip

at http://brandleadershipmarketing.com/apache

I zipped up the entire build directory because I cannot test these. If
they are ok I will figure out what parts to package.

Your feed back would be appreciated.

Chris.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to