Hi, On Sat, May 21, 2016 at 07:05:01PM +0200, Jens Neuhalfen wrote: > ./t_lpback.sh fails with AES-GCM mode on Solaris 11. CRYPTO_gcm128_setiv from > libcrypto seems to jump into NULL pointer country.
Oh, interesting. My OpenSSL on the OpenSolaris box is so old that it does not have the AES-GCM modes, so I never tested this (and, of course, "all tests pass"). Is this Sparc or Intel Solaris? Which version of OpenSSL? 32 or 64 bit? I tried building with 1.0.2g (static libraries, 32 bit) and that actually passes GCM tests for me... -n Testing cipher AES-128-CBC... OK -n Testing cipher AES-128-CFB... OK -n Testing cipher AES-128-CFB1... OK -n Testing cipher AES-128-CFB8... OK -n Testing cipher AES-128-GCM... OK ... OK -n Testing cipher AES-256-CFB8... OK -n Testing cipher AES-256-GCM... OK -n Testing cipher AES-256-OFB... OK ... ====================== All 2 tests passed (1 tests were not run) ====================== OpenVPN 2.PRODUCT_VERSION_MINORPRODUCT_VERSION_PATCH [git:master/a9faebe7d4234cdf+] i386-pc-solaris2.11 [SSL (OpenSSL)] [LZO] [LZ4] [IPv6] built on May 21 2016 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.03 ... so at this point, it's hard to say... gert PS: and yes, our test scripts and Solaris' "echo" function do not like each other very much. And neither does the script that builds the version number from git :-) -- USENET is *not* the non-clickable part of WWW! //www.muc.de/~gert/ Gert Doering - Munich, Germany g...@greenie.muc.de fax: +49-89-35655025 g...@net.informatik.tu-muenchen.de
signature.asc
Description: PGP signature