PATH=C:\cpanfly-5.24-64\var\megalib\bin;C:\Perl-5.24-64\site\bin;C:\Perl-5.24-64\bin;C:\MinGW-64\bin;C:\cygwin\bin;C:\instantclient_11_2-64;C:\cpanfly-5.24-64\var\megalib\bin;C:\Perl-5.24-64\site\bin;C:\Perl-5.24-64\bin;C:\MinGW-64\bin;C:\cygwin\bin;C:\instantclient_11_2-64;C:\p4;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files\Git\cmd;C:\Program Files (x86)\CMake\bin Start 2017-01-08T08:30:15 ActivePerl-2400 CPAN-2.10 PATH=C:/CPANFL~1.24-/var/libs/bin;C:\CPANFL~1.24-\var\megalib\bin;C:\PERL-5~1.24-\site\bin;C:\PERL-5~1.24-\bin;C:\MinGW-64\bin;C:\cygwin\bin;C:\INSTAN~1;C:\CPANFL~1.24-\var\megalib\bin;C:\PERL-5~1.24-\site\bin;C:\PERL-5~1.24-\bin;C:\MinGW-64\bin;C:\cygwin\bin;C:\INSTAN~1;C:\p4;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WINDOW~1\v1.0\;C:\PROGRA~1\Git\cmd;C:\PROGRA~2\CMake\bin Reading 'C:\cpanfly-5.24-64\var\cpan\Metadata' Database was generated on Sun, 08 Jan 2017 05:17:02 GMT Checksum for C:\cpanfly-5.24-64\var\cpan\sources\authors\id\S\SU\SULLR\IO-Socket-SSL-2.043.tar.gz ok IO-Socket-SSL-2.043/ IO-Socket-SSL-2.043/certs/ IO-Socket-SSL-2.043/certs/server-key.der IO-Socket-SSL-2.043/certs/test-ca.pem IO-Socket-SSL-2.043/certs/server-rsa384-dh.pem IO-Socket-SSL-2.043/certs/server-cert.der IO-Socket-SSL-2.043/certs/my-ca.pem IO-Socket-SSL-2.043/certs/client-key.pem IO-Socket-SSL-2.043/certs/proxyca.pem IO-Socket-SSL-2.043/certs/server-key.enc IO-Socket-SSL-2.043/certs/client-cert.pem IO-Socket-SSL-2.043/certs/client-key.enc IO-Socket-SSL-2.043/certs/server.p12 IO-Socket-SSL-2.043/certs/server-key.pem IO-Socket-SSL-2.043/certs/server-cert.pem IO-Socket-SSL-2.043/certs/server-wildcard.pem IO-Socket-SSL-2.043/certs/server_enc.p12 IO-Socket-SSL-2.043/README.Win32 IO-Socket-SSL-2.043/MANIFEST IO-Socket-SSL-2.043/Makefile.PL IO-Socket-SSL-2.043/example/ IO-Socket-SSL-2.043/example/simulate_proxy.pl IO-Socket-SSL-2.043/example/async_https_server.pl IO-Socket-SSL-2.043/example/ssl_mitm.pl IO-Socket-SSL-2.043/example/ssl_server.pl IO-Socket-SSL-2.043/example/ssl_client.pl IO-Socket-SSL-2.043/example/lwp-with-verifycn.pl IO-Socket-SSL-2.043/Changes IO-Socket-SSL-2.043/BUGS IO-Socket-SSL-2.043/META.yml IO-Socket-SSL-2.043/docs/ IO-Socket-SSL-2.043/docs/debugging.txt IO-Socket-SSL-2.043/t/ IO-Socket-SSL-2.043/t/testlib.pl IO-Socket-SSL-2.043/t/io-socket-inet6.t IO-Socket-SSL-2.043/t/nonblock.t IO-Socket-SSL-2.043/t/sysread_write.t IO-Socket-SSL-2.043/t/01loadmodule.t IO-Socket-SSL-2.043/t/public_suffix_lib.pl IO-Socket-SSL-2.043/t/start-stopssl.t IO-Socket-SSL-2.043/t/alpn.t IO-Socket-SSL-2.043/t/public_suffix_lib_libidn.t IO-Socket-SSL-2.043/t/signal-readline.t IO-Socket-SSL-2.043/t/cert_no_file.t IO-Socket-SSL-2.043/t/memleak_bad_handshake.t IO-Socket-SSL-2.043/t/readline.t IO-Socket-SSL-2.043/t/mitm.t IO-Socket-SSL-2.043/t/public_suffix_lib_uri.t IO-Socket-SSL-2.043/t/ecdhe.t IO-Socket-SSL-2.043/t/acceptSSL-timeout.t IO-Socket-SSL-2.043/t/startssl.t IO-Socket-SSL-2.043/t/sni.t IO-Socket-SSL-2.043/t/dhe.t IO-Socket-SSL-2.043/t/compatibility.t IO-Socket-SSL-2.043/t/verify_hostname_standalone.t IO-Socket-SSL-2.043/t/verify_fingerprint.t IO-Socket-SSL-2.043/t/npn.t IO-Socket-SSL-2.043/t/protocol_version.t IO-Socket-SSL-2.043/t/auto_verify_hostname.t IO-Socket-SSL-2.043/t/connectSSL-timeout.t IO-Socket-SSL-2.043/t/public_suffix_ssl.t IO-Socket-SSL-2.043/t/sessions.t IO-Socket-SSL-2.043/t/plain_upgrade_downgrade.t IO-Socket-SSL-2.043/t/core.t IO-Socket-SSL-2.043/t/session_ticket.t IO-Socket-SSL-2.043/t/sni_verify.t IO-Socket-SSL-2.043/t/public_suffix_lib_encode_idn.t IO-Socket-SSL-2.043/t/cert_formats.t IO-Socket-SSL-2.043/t/startssl-failed.t IO-Socket-SSL-2.043/t/io-socket-ip.t IO-Socket-SSL-2.043/t/verify_hostname.t IO-Socket-SSL-2.043/t/external/ IO-Socket-SSL-2.043/t/external/fingerprint.pl IO-Socket-SSL-2.043/t/external/usable_ca.t IO-Socket-SSL-2.043/t/external/ocsp.t IO-Socket-SSL-2.043/META.json IO-Socket-SSL-2.043/lib/ IO-Socket-SSL-2.043/lib/IO/ IO-Socket-SSL-2.043/lib/IO/Socket/ IO-Socket-SSL-2.043/lib/IO/Socket/SSL.pm IO-Socket-SSL-2.043/lib/IO/Socket/SSL/ IO-Socket-SSL-2.043/lib/IO/Socket/SSL/Intercept.pm IO-Socket-SSL-2.043/lib/IO/Socket/SSL/PublicSuffix.pm IO-Socket-SSL-2.043/lib/IO/Socket/SSL/Utils.pm IO-Socket-SSL-2.043/lib/IO/Socket/SSL.pod IO-Socket-SSL-2.043/README Configuring S/SU/SULLR/IO-Socket-SSL-2.043.tar.gz with Makefile.PL >>> C:\Perl-5.24-64\bin\perl.exe Makefile.PL Checking if your kit is complete... Looks good Have \cpanfl~1.24-\var\megalib Want \perl-5~1.24-\lib Your perl and your Config.pm seem to have different ideas about the architecture they are running on. Perl thinks: [megalib] Config says: [MSWin32-x64-multi-thread] This may or may not cause problems. Please check your installation of perl if you have problems building this extension. Generating a dmake-style Makefile Writing Makefile for IO::Socket::SSL Writing MYMETA.yml and MYMETA.json SULLR/IO-Socket-SSL-2.043.tar.gz C:\Perl-5.24-64\bin\perl.exe Makefile.PL -- OK Running make for S/SU/SULLR/IO-Socket-SSL-2.043.tar.gz >>> dmake cp lib/IO/Socket/SSL/Utils.pm blib\lib\IO\Socket\SSL\Utils.pm cp lib/IO/Socket/SSL/Intercept.pm blib\lib\IO\Socket\SSL\Intercept.pm cp lib/IO/Socket/SSL/PublicSuffix.pm blib\lib\IO\Socket\SSL\PublicSuffix.pm cp lib/IO/Socket/SSL.pod blib\lib\IO\Socket\SSL.pod cp lib/IO/Socket/SSL.pm blib\lib\IO\Socket\SSL.pm SULLR/IO-Socket-SSL-2.043.tar.gz dmake -- OK Running make test >>> dmake test TEST_VERBOSE=1 "C:\Perl-5.24-64\bin\perl.exe" "-MExtUtils::Command::MM" "-MTest::Harness" "-e" "undef *Test::Harness::Switches; test_harness(1, 'blib\lib', 'blib\arch')" t/*.t t/external/*.t # openssl version=0x1000208f # Net::SSLeay version=1.80 # parent IO::Socket::IP version=0.38 t/01loadmodule.t .................. 1..3 ok 1 - loaded ok 2 - IO::Socket::SSL::DEBUG 1 ok 3 - Net::SSLeay::trace 1 ok t/acceptSSL-timeout.t ............. 1..15 ok # listening @127.0.0.1:56100 # server >> OK << ok # [server] OK # server >> Waiting << ok # [server] Waiting # client_ssl >> OK << ok # [client_ssl] OK # server >> Connect from 127.0.0.1:56101 << ok # [server] Connect from # client_ssl >> Connected << ok # [client_ssl] Connected # server >> SSL Handshake OK << ok # [server] SSL Handshake OK # client_ssl >> Hi! << ok # [client_ssl] Hi! ok # listening @127.0.0.1:56102 # server >> OK << ok # [server] OK # server >> Waiting << ok # [server] Waiting # client_no_ssl >> OK << ok # [client_no_ssl] OK # server >> Connect from 127.0.0.1:56103 << ok # [server] Connect from # client_no_ssl >> Connected << ok # [client_no_ssl] Connected # server >> SSL Handshake FAILED - A non-blocking socket operation could not be completed immediately. << ok # [server] SSL Handshake FAILED ok t/alpn.t .......................... 1..5 ok # [server] Server Initialization at 127.0.0.1 # server at 127.0.0.1:56104 ok # [client] client connected ok # [client] negotiated two ok # [server] Server accepted ok # [server] negotiated two ok t/auto_verify_hostname.t .......... 1..30 ok 1 - Server Initialization ok 2 - connection to example.com/www failed ok 3 - connection to server.local/ldap succeeded ok 4 - received hallo ok 5 - connection to server.local/www failed ok 6 - connection to bla.server.local/www succeeded ok 7 - received hallo ok 8 - connection to www7.other.local/www succeeded ok 9 - received hallo ok 10 - connection to www7.other.local/ldap failed ok 11 - connection to bla.server.local/ldap succeeded ok 12 - received hallo ok 13 - tcp connect ok 14 - ssl upgrade of connection to example.com/www failed ok 15 - tcp connect ok 16 - ssl upgrade of connection to server.local/ldap succeeded ok 17 - received hallo ok 18 - tcp connect ok 19 - ssl upgrade of connection to server.local/www failed ok 20 - tcp connect ok 21 - ssl upgrade of connection to bla.server.local/www succeeded ok 22 - received hallo ok 23 - tcp connect ok 24 - ssl upgrade of connection to www7.other.local/www succeeded ok 25 - received hallo ok 26 - tcp connect ok 27 - ssl upgrade of connection to www7.other.local/ldap failed ok 28 - tcp connect ok 29 - ssl upgrade of connection to bla.server.local/ldap succeeded ok 30 - received hallo ok t/cert_formats.t .................. 1..6 ok 1 - [PEM] ssl connect success ok 2 - [PEM_one_file] ssl connect success ok 3 - [PEM_keyenc] ssl connect success ok 4 - [DER] ssl connect success ok 5 - [PKCS12] ssl connect success ok 6 - [PKCS12_enc] ssl connect success ok t/cert_no_file.t .................. 1..9 ok - Server Initialization Using SSL_cert_file ok - Server accepted Using SSL_cert_file ok - client connected Using SSL_cert_file ok - Server Initialization Using SSL_cert ok - Server accepted Using SSL_cert ok - client connected Using SSL_cert ok - Server Initialization Empty SSL_cert ok - Empty SSL_cert: accept succeeded ok - Empty SSL_cert: connect succeeded ok t/compatibility.t ................. 1..9 ok - server create ok - socketToSSL ok - ssl upgrade ok - class MyClass ok - issuer_name ok - subject_name ok - opened ok - socket_to_SSL ok - upgrade is MyClass ok t/connectSSL-timeout.t ............ 1..16 ok # listening @127.0.0.1:56137 # server >> OK << ok # [server] OK # server >> Waiting << ok # [server] Waiting # client >> OK << ok # [client] OK # server >> Connect from 127.0.0.1:56138 << ok # [server] Connect from # client >> Connected << ok # [client] Connected # server >> Server SSL Handshake OK << ok # [server] Server SSL Handshake OK # client >> Client SSL Handshake OK << ok # [client] Client SSL Handshake OK # client >> Hi! << ok # [client] Hi! ok # listening @127.0.0.1:56139 # server >> OK << ok # [server] OK # server >> Waiting << ok # [server] Waiting # client >> OK << ok # [client] OK # server >> Connect from 127.0.0.1:56140 << ok # [server] Connect from # client >> Connected << ok # [client] Connected # client >> Client SSL Handshake FAILED - SSL wants a read first << ok # [client] Client SSL Handshake FAILED ok t/core.t .......................... 1..48 ok - Server Initialization ok - Server Fileno Check ok - Server non-SSL Client Check ok - Server Kill-client Check ok - Client non-SSL connection ok - Client Verify-sub Check ok - Client Verify-sub Check ok - Server Client Accept Check ok - Client Initialization ok - Accept returning peer address check. ok - Client Fileno Check ok - Server Client Fileno Check ok - Client Peer Certificate Check ok - Client Peer Certificate Issuer Check ok - Client Cipher Check ok - Server Peek Check ok - Server Pending Check ok - Client Peek Check ok - Server Sysread Check ok - Server Getline Check ok - Server Getc Check ok - Server Getlines Check 1 ok - Server Getlines Check 2 ok - Server Getlines Check 3 ok - Server Getlines Check 4 ok - Server Getlines Check 5 ok - Client Sysread Check ok - Client Getline Check ok - Client Getc Check ok - Client Getlines Check 1 ok - Client Getlines Check 2 ok - Client Getlines Check 3 ok - Client Getlines Check 4 ok - Client Getlines Check 5 ok - Client Finished Reading Check ok - Second Client Initialization ok - Client Verify-sub Check ok - Client Verify-sub Check ok - Client Init from Fileno Check ok - Peer address check ok - Server Nonblocking Check 1 ok - Server Client Opened Check 1 ok - Client (fileno) Readline Check ok - Server Client Opened Check 2 ok - Server Nonblocking Check 2 ok - Client Nonblocking Check 1 ok - Server Nonblocking Check 3 ok - Client Nonblocking Check 2 ok t/dhe.t ........................... 1..3 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok t/ecdhe.t ......................... 1..4 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok # [client] ecdh key exchange: ECDHE-RSA-AES128-GCM-SHA256 ok # tcp connect to www.chksum.de:443 ok # tcp connect to www.spiegel.de:443 ok # fingerprint matches # validation with default CA w/o OCSP ok # validation with default CA with OCSP defaults ok # validation with default CA with OCSP full chain ok # tcp connect to revoked.grc.com:443 ok # fingerprint matches # validation with default CA w/o OCSP ok t/external/ocsp.t ................. 1..3 ok 1 # skip fingerprints do not match ok 2 - OCSP tests www.spiegel.de:443 ok ok 3 - revoked as expected (asked OCSP server) ok # found 152 CA certs # have root CA for www.spiegel.de in store # 5 connections to www.spiegel.de ok # fingerprint www.spiegel.de matches # check www.spiegel.de against builtin CA store ok # have root CA for www.twitter.com in store # 5 connections to www.twitter.com ok # have root CA for www.facebook.com in store # 5 connections to www.facebook.com ok # have root CA for www.live.com in store # 5 connections to www.live.com ok t/external/usable_ca.t ............ 1..21 ok 1 - SSL upgrade www.spiegel.de with default CA and SSL_verifycn_name ok 2 - SSL upgrade www.spiegel.de with default CA and SSL_hostname ok 3 - SSL upgrade www.spiegel.de with no CA failed ok 4 # skip no root CA 415660c1 for www.yahoo.com in store ok 5 # skip no root CA 415660c1 for www.yahoo.com in store ok 6 # skip no root CA 415660c1 for www.yahoo.com in store ok 7 # skip no root CA 415660c1 for www.comdirect.de in store ok 8 # skip no root CA 415660c1 for www.comdirect.de in store ok 9 # skip no root CA 415660c1 for www.comdirect.de in store ok 10 # skip no root CA 415660c1 for meine.deutsche-bank.de in store ok 11 # skip no root CA 415660c1 for meine.deutsche-bank.de in store ok 12 # skip no root CA 415660c1 for meine.deutsche-bank.de in store ok 13 # skip fingerprint mismatch (sha1$235a79b3270d790505e0bea2cf5c149f9038821b) - probably SSL interception or certificate changed ok 14 # skip fingerprint mismatch (sha1$235a79b3270d790505e0bea2cf5c149f9038821b) - probably SSL interception or certificate changed ok 15 # skip fingerprint mismatch (sha1$235a79b3270d790505e0bea2cf5c149f9038821b) - probably SSL interception or certificate changed ok 16 # skip fingerprint mismatch (sha1$936f912bafad216fa515256e572cdc35a1451aa5) - probably SSL interception or certificate changed ok 17 # skip fingerprint mismatch (sha1$936f912bafad216fa515256e572cdc35a1451aa5) - probably SSL interception or certificate changed ok 18 # skip fingerprint mismatch (sha1$936f912bafad216fa515256e572cdc35a1451aa5) - probably SSL interception or certificate changed ok 19 # skip fingerprint mismatch (sha1$5bc96dbca7cc645b6495d1b34275c7e7272906bf) - probably SSL interception or certificate changed ok 20 # skip fingerprint mismatch (sha1$5bc96dbca7cc645b6495d1b34275c7e7272906bf) - probably SSL interception or certificate changed ok 21 # skip fingerprint mismatch (sha1$5bc96dbca7cc645b6495d1b34275c7e7272906bf) - probably SSL interception or certificate changed ok t/io-socket-inet6.t ............... 1..3 # IO::Socket::INET6 version=2.72 ok # [server] Server Initialization at ::1 # server at [::1]:56185 ok # [server] Server accepted ok # [client] client connected ok t/io-socket-ip.t .................. 1..3 # IO::Socket::IP version=0.38 ok # [server] Server Initialization at ::1 # server at [::1]:56189 ok # [server] Server accepted ok # [client] client connected ok t/memleak_bad_handshake.t ......... skipped: ps not implemented on this platform t/mitm.t .......................... 1..8 ok # server ssl socket ok # proxy tcp socket ok # ssl connected to server ok # subject w/o mitm ok # issuer w/o mitm ok # ssl connected to proxy ok # subject w/ mitm ok # issuer w/ mitm ok t/nonblock.t ...................... 1..27 ok # [server] Server Initialization # connect not yet completed ok # [server] tcp accept # claims that socket is already connected ok # [client] client tcp connect # wrote 9 bytes ok # [server] received plain text ok # [client] write plain text ok # [server] upgrade to_client to IO::Socket::SSL ok # [client] upgrade client to IO::Socket::SSL # SSL wants a read first # SSL wants a read first ok # [server] ssl accept handshake done ok # [client] connected ok # [client] nonblocking connect with 2 attempts # sndbuf=8192 ok # [server] received client message # $!=A non-blocking socket operation could not be completed immediately. $SSL_ERROR=SSL wants a write first send=2120 # wait for write # $!=A non-blocking socket operation could not be completed immediately. $SSL_ERROR=SSL wants a read first # read 30000 (2 r/w attempts) # $!= $SSL_ERROR=SSL write error (5) send=30050 # connection closed ok # [client] syswrite ok # [client] multiple write attempts ok # [client] 30000 bytes send # connect not yet completed ok # [server] tcp accept # claims that socket is already connected ok # [client] client tcp connect ok # [server] received plain text # wrote 9 bytes ok # [client] write plain text ok # [server] upgrade to_client to IO::Socket::SSL ok # [client] upgrade client to IO::Socket::SSL # SSL wants a read first # SSL wants a read first ok # [server] ssl accept handshake done ok # [client] connected ok # [server] nonblocking accept_SSL with 2 attempts # sndbuf=8192 ok # [server] received client message # $!=A non-blocking socket operation could not be completed immediately. $SSL_ERROR=SSL wants a write first send=2120 # wait for write # $!=A non-blocking socket operation could not be completed immediately. $SSL_ERROR=SSL wants a read first # read 30000 (3 r/w attempts) # $!= $SSL_ERROR=SSL write error (5) send=30030 # connection closed ok # [client] syswrite ok # [client] multiple write attempts ok # [client] 30000 bytes send ok t/npn.t ........................... 1..5 ok # [server] Server Initialization at 127.0.0.1 # server at 127.0.0.1:56200 ok # [server] Server accepted ok # [client] client connected ok # [server] negotiated two ok # [client] negotiated two ok # -- test: newINET start_SSL stop_SSL start_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x160301 from client # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 connect_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 start_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # server accepted new client # wait for initial data from client # got 0x656e64 from client # client requested end of tests t/plain_upgrade_downgrade.t ....... 1..15 ok 1 - newINET ok 2 - start_SSL ok 3 - stop_SSL ok 4 - start_SSL ok 5 - newSSL ok 6 - stop_SSL ok 7 - connect_SSL ok 8 - newSSL:0 ok 9 - connect_SSL ok 10 - stop_SSL ok 11 - connect_SSL ok 12 - newSSL:0 ok 13 - start_SSL ok 14 - stop_SSL ok 15 - connect_SSL ok t/protocol_version.t .............. ok 1 - accept SSLv23 with any, got TLSv1_2 ok 2 - accept SSLv3 with any, got SSLv3 ok 3 - accept SSLv3 with SSLv3 ok 4 - accept SSLv23:!TLSv1_2:!TLSv1_1:!TLSv1 with SSLv3 ok 5 - accept TLSv1 with TLSv1 ok 6 - accept SSLv23:!TLSv1_2:!TLSv1_1 with TLSv1 ok 7 - accept TLSv1_1 with TLSv1_1 ok 8 - accept SSLv23:!TLSv1_2 with TLSv1_1 ok 9 - accept TLSv1_2 with TLSv1_2 ok 10 - accept SSLv23 with TLSv1_2 1..10 ok t/public_suffix_lib_encode_idn.t .. 1..79 ok 1 - create two-level ok 2 - com -> + com ok 3 - bar.com -> + bar.com ok 4 - www.bar.com -> www + bar.com ok 5 - www.foo.bar.com -> www.foo + bar.com ok 6 - uk -> + uk ok 7 - co.uk -> + co.uk ok 8 - www.co.uk -> + www.co.uk ok 9 - www.bar.co.uk -> www + bar.co.uk ok 10 - www.foo.bar.co.uk -> www.foo + bar.co.uk ok 11 - bl.uk -> + bl.uk ok 12 - www.bl.uk -> www + bl.uk ok 13 - www.bar.bl.uk -> www.bar + bl.uk ok 14 - www.foo.bar.bl.uk -> www.foo.bar + bl.uk ok 15 ok 16 ok 17 ok 18 ok 19 ok 20 ok 21 ok 22 ok 23 ok 24 ok 25 ok 26 ok 27 ok 28 ok 29 ok 30 ok 31 ok 32 ok 33 ok 34 ok 35 ok 36 ok 37 ok 38 ok 39 ok 40 ok 41 ok 42 ok 43 ok 44 ok 45 ok 46 ok 47 ok 48 ok 49 ok 50 ok 51 ok 52 ok 53 ok 54 ok 55 ok 56 ok 57 ok 58 ok 59 ok 60 ok 61 ok 62 ok 63 ok 64 ok 65 ok 66 ok 67 ok 68 ok 69 ok 70 ok 71 ok 72 ok 73 ok 74 ok 75 ok 76 ok 77 ok 78 ok 79 ok t/public_suffix_lib_libidn.t ...... 1..79 ok 1 - create two-level ok 2 - com -> + com ok 3 - bar.com -> + bar.com ok 4 - www.bar.com -> www + bar.com ok 5 - www.foo.bar.com -> www.foo + bar.com ok 6 - uk -> + uk ok 7 - co.uk -> + co.uk ok 8 - www.co.uk -> + www.co.uk ok 9 - www.bar.co.uk -> www + bar.co.uk ok 10 - www.foo.bar.co.uk -> www.foo + bar.co.uk ok 11 - bl.uk -> + bl.uk ok 12 - www.bl.uk -> www + bl.uk ok 13 - www.bar.bl.uk -> www.bar + bl.uk ok 14 - www.foo.bar.bl.uk -> www.foo.bar + bl.uk ok 15 ok 16 ok 17 ok 18 ok 19 ok 20 ok 21 ok 22 ok 23 ok 24 ok 25 ok 26 ok 27 ok 28 ok 29 ok 30 ok 31 ok 32 ok 33 ok 34 ok 35 ok 36 ok 37 ok 38 ok 39 ok 40 ok 41 ok 42 ok 43 ok 44 ok 45 ok 46 ok 47 ok 48 ok 49 ok 50 ok 51 ok 52 ok 53 ok 54 ok 55 ok 56 ok 57 ok 58 ok 59 ok 60 ok 61 ok 62 ok 63 ok 64 ok 65 ok 66 ok 67 ok 68 ok 69 ok 70 ok 71 ok 72 ok 73 ok 74 ok 75 ok 76 ok 77 ok 78 # skip no IDN support with Net::LibIDN ok 79 # skip no IDN support with Net::LibIDN ok t/public_suffix_lib_uri.t ......... 1..79 ok 1 - create two-level ok 2 - com -> + com ok 3 - bar.com -> + bar.com ok 4 - www.bar.com -> www + bar.com ok 5 - www.foo.bar.com -> www.foo + bar.com ok 6 - uk -> + uk ok 7 - co.uk -> + co.uk ok 8 - www.co.uk -> + www.co.uk ok 9 - www.bar.co.uk -> www + bar.co.uk ok 10 - www.foo.bar.co.uk -> www.foo + bar.co.uk ok 11 - bl.uk -> + bl.uk ok 12 - www.bl.uk -> www + bl.uk ok 13 - www.bar.bl.uk -> www.bar + bl.uk ok 14 - www.foo.bar.bl.uk -> www.foo.bar + bl.uk ok 15 ok 16 ok 17 ok 18 ok 19 ok 20 ok 21 ok 22 ok 23 ok 24 ok 25 ok 26 ok 27 ok 28 ok 29 ok 30 ok 31 ok 32 ok 33 ok 34 ok 35 ok 36 ok 37 ok 38 ok 39 ok 40 ok 41 ok 42 ok 43 ok 44 ok 45 ok 46 ok 47 ok 48 ok 49 ok 50 ok 51 ok 52 ok 53 ok 54 ok 55 ok 56 ok 57 ok 58 ok 59 ok 60 ok 61 ok 62 ok 63 ok 64 ok 65 ok 66 ok 67 ok 68 ok 69 ok 70 ok 71 ok 72 ok 73 ok 74 ok 75 ok 76 ok 77 ok 78 ok 79 ok t/public_suffix_ssl.t ............. 1..26 ok 1 - ssl com against * -> fail (hostname verification failed) ok 2 - ssl com against com -> ok ok 3 - ssl googleapis.com against *.com -> fail (hostname verification failed) ok 4 - ssl googleapis.com against googleapis.com -> ok ok 5 - ssl ajax.googleapis.com against *.googleapis.com -> ok ok 6 - ssl s3.amazonaws.com against s3.amazonaws.com -> ok ok 7 - ssl foo.s3.amazonaws.com against *.s3.amazonaws.com -> ok ok 8 - ssl google.com against *.com -> fail (hostname verification failed) ok 9 - ssl google.com against google.com -> ok ok 10 - ssl www.google.com against *.google.com -> ok ok 11 - ssl www.bar.com against *.bar.com -> ok ok 12 - ssl www.foo.bar.com against *.foo.bar.com -> ok ok 13 - ssl www.foo.co.uk against *.foo.co.uk -> ok ok 14 - ssl www.co.uk against *.co.uk -> fail (hostname verification failed) ok 15 - ssl co.uk against *.uk -> fail (hostname verification failed) ok 16 - ssl bl.uk against bl.uk -> ok ok 17 - ssl www.bl.uk against *.bl.uk -> ok ok 18 - ssl bar.kobe.jp against *.kobe.jp -> fail (hostname verification failed) ok 19 - ssl foo.bar.kobe.jp against *.bar.kobe.jp -> fail (hostname verification failed) ok 20 - ssl www.foo.bar.kobe.jp against *.foo.bar.kobe.jp -> ok ok 21 - ssl city.kobe.jp against *.kobe.jp -> fail (hostname verification failed) ok 22 - ssl city.kobe.jp against city.kobe.jp -> ok ok 23 - ssl www.city.kobe.jp against *.city.kobe.jp -> ok ok 24 - ssl nodomain against * -> fail (hostname verification failed) ok 25 - ssl foo.nodomain against *.nodomain -> fail (hostname verification failed) ok 26 - ssl www.foo.nodomain against *.foo.nodomain -> ok ok t/readline.t ...................... 1..19 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok # [client] Test00 ok # [server] Server accepted ok # [client] client connected ok # [client] Test01 ok # [server] Server accepted ok # [client] client connected ok # [client] Test02 ok # [server] Server accepted ok # [client] client connected ok # [client] Test03 ok # [server] Server accepted ok # [client] client connected ok # [client] Test04 ok # [server] Server accepted ok # [client] client connected ok # [client] Test05 ok # listen at 127.0.0.1:56255 # listen at 127.0.0.1:56256 # connect to 0: success reuse=0 # connect to 0: success reuse=1 # connect to 1: success reuse=1 # connect to 1: success reuse=0 # connect to 0: success reuse=0 # connect to 0: success reuse=1 t/session_ticket.t ................ 1..6 access to server[0] creating new ticket key1 server[0] reused=0 ok 1 - no initial session -> no reuse access to server[0] using current ticket secret server[0] reused=1 ok 2 - reuse with the next session and secret[0] access to server[1] using current ticket secret server[1] reused=1 rotate secrets ok 3 - reuse even though server changed, since they share ticket secret access to server[1] using non-current ticket secret creating new ticket key2 server[1] reused=0 rotate secrets ok 4 - reports non-reuse since server1 changed secret to secret[1] access to server[0] using non-current ticket secret creating new ticket key1 server[0] reused=0 ok 5 - reports non-reuse on server0 since got ticket with secret[1] in last step access to server[0] using current ticket secret server[0] reused=1 ok 6 - reuse again since got ticket with secret[0] in last step ok t/sessions.t ...................... 1..35 ok #Server initialization ok #Context init ok #Superficial Cache Addition Test ok #Superficial Cache Addition Test 2 ok #Cache Keys Check 1 ok #Cache Keys Check 2 ok #Cache Head Check ok #Cache Link Check ok #Client init ok #Client init ok #Cache Keys Check 3 ok #Cache Removal Test ok #Cache Tail Check ok #Cache Insertion Test ok #Cache Entry Test 0 ok #Cache Entry Test 1 ok #Cache Entry Test 2 ok #Cache Keys Check 4 ok #Cache Keys Check 5 ok #Second Cache Entry Test 0 ok #Client init 2 ok #Write Test 0 ok #Server Read 0 ok #Server Write 0 ok #Read Test 0 ok #Second Cache Entry Test 1 ok #Write Test 1 ok #Server Read 1 ok #Server Write 1 ok #Read Test 1 ok #Second Cache Entry Test 2 ok #Write Test 2 ok #Server Read 2 ok #Server Write 2 ok #Read Test 2 ok t/signal-readline.t ............... skipped: signals not relevant on this platform t/sni.t ........................... 1..17 ok # Server Initialization ok # client ssl connect server.local ok # client verify hostname in cert server.local ok # client ssl connect client.local ok # client verify hostname in cert client.local ok # client ssl connect smtp.mydomain.local ok # client verify hostname in cert smtp.mydomain.local ok # client ssl connect www13.other.local ok # client verify hostname in cert www13.other.local ok # server accept ok # server got SNI name server.local ok # server accept ok # server got SNI name client.local ok # server accept ok # server got SNI name smtp.mydomain.local ok # server accept ok # server got SNI name www13.other.local ok t/sni_verify.t .................... 1..17 ok # Server Initialization ok # client ssl connect server.local ok # client verify hostname in cert server.local ok # client ssl connect client.local ok # client verify hostname in cert client.local ok # client ssl connect smtp.mydomain.local ok # client verify hostname in cert smtp.mydomain.local ok # client ssl connect www13.other.local ok # client verify hostname in cert www13.other.local ok # server accept ok # server got SNI name server.local ok # server accept ok # server got SNI name client.local ok # server accept ok # server got SNI name smtp.mydomain.local ok # server accept ok # server got SNI name www13.other.local ok t/start-stopssl.t ................. 1..16 ok #listen ok #client connect ok # server::class=IO::Socket::SSL ok # client::start_SSL ok # client::class=IO::Socket::SSL ok # client::stop_SSL ok # client::class=IO::Socket::INET ok #server::stop_SSL ok # class=IO::Socket::INET ok # client::start_SSL ok # client::class=IO::Socket::SSL ok # server::class=IO::Socket::SSL ok # client::close ok # client::class=IO::Socket::SSL ok #server::close ok # class=IO::Socket::SSL ok t/startssl-failed.t ............... 1..9 ok #Server Initialization ok #client tcp connect ok #tcp accept ok #send non-ssl data ok #startssl client failed: SSL connect attempt failed error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol ok #downgrade socket after error ok #send to server ok #received non-ssl data ok #client receive non-ssl data ok t/startssl.t ...................... 1..21 ok #Server Initialization ok #Server Fileno Check ok #client tcp connect ok #tcp accept ok #sslify server ok #server reblessed as IO::Socket::SSL ok #sslify client ok #client reblessed as IO::Socket::SSL ok #server local certificate subject ok #client local certificate subject ok #server local certificate issuer ok #client local certificate issuer ok #client local certificate fingerprint ok #server local certificate fingerprint ok #client peer certificate subject ok #server peer certificate subject ok #client peer certificate issuer ok #server peer certificate issuer ok #client peer certificate fingerprint ok #server peer certificate fingerprint ok #received client message ok t/sysread_write.t ................. 1..9 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok # [server] partial read in sysread ok # [server] send ack back ok # [client] received ack ok # [client] send in time ok # [client] partial write in syswrite ok # [client] full write in write (18000) ok Timeout (max run time is 300s) C:\Perl-5.24-64\bin\perl.exe exits with 37.