Hi,

On Sat, May 21, 2016 at 07:05:01PM +0200, Jens Neuhalfen wrote:
> ./t_lpback.sh fails with AES-GCM mode on Solaris 11. CRYPTO_gcm128_setiv from 
> libcrypto seems to jump into NULL pointer country. 

Oh, interesting.  My OpenSSL on the OpenSolaris box is so old that it does
not have the AES-GCM modes, so I never tested this (and, of course, "all 
tests pass").

Is this Sparc or Intel Solaris?  Which version of OpenSSL?  32 or 64 bit?

I tried building with 1.0.2g (static libraries, 32 bit) and that actually
passes GCM tests for me...

-n Testing cipher AES-128-CBC... 
OK
-n Testing cipher AES-128-CFB... 
OK
-n Testing cipher AES-128-CFB1... 
OK
-n Testing cipher AES-128-CFB8... 
OK
-n Testing cipher AES-128-GCM... 
OK
...
OK
-n Testing cipher AES-256-CFB8... 
OK
-n Testing cipher AES-256-GCM... 
OK
-n Testing cipher AES-256-OFB... 
OK
...
======================
All 2 tests passed
(1 tests were not run)
======================


OpenVPN 2.PRODUCT_VERSION_MINORPRODUCT_VERSION_PATCH 
[git:master/a9faebe7d4234cdf+] i386-pc-solaris2.11 [SSL (OpenSSL)] [LZO] [LZ4] 
[IPv6] built on May 21 2016
library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.03


... so at this point, it's hard to say... 

gert

PS: and yes, our test scripts and Solaris' "echo" function do not like
each other very much.  And neither does the script that builds the version
number from git :-)
-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de

Attachment: signature.asc
Description: PGP signature

Reply via email to