PATH=C:\mingw\bin;C:\cygwin\bin;C:\Perl-5.18\site\bin;C:\Perl-5.18\bin;C:\cygwin\bin;C:\Program Files\Perforce;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\instantclient_11_2;C:\cygwin\bin;C:\Program Files\Perforce;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\WINDOWS\system32\WindowsPowerShell\v1.0 Start 2014-03-13T03:31:24 ActivePerl-1800 CPAN-2.00 LIB=C:\PROGRA~1\MICROS~3\VC98\Lib\PSDK PATH=C:/CPANFL~1.18/var/libs/bin;C:\mingw\bin;C:\cygwin\bin;C:\Perl-5.18\site\bin;C:\Perl-5.18\bin;C:\cygwin\bin;C:\PROGRA~1\Perforce;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WINDOW~2\v1.0;C:\WINDOWS\system32\WINDOW~2\v1.0;C:\INSTAN~1;C:\cygwin\bin;C:\PROGRA~1\Perforce;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WINDOW~2\v1.0;C:\WINDOWS\system32\WINDOW~2\v1.0 Reading 'C:\cpanfly-5.18\var\cpan\Metadata' Database was generated on Thu, 13 Mar 2014 10:06:19 GMT Running make for S/SU/SULLR/IO-Socket-SSL-1.968.tar.gz Fetching with LWP: http://cpan.nas1.activestate.com/authors/id/S/SU/SULLR/IO-Socket-SSL-1.968.tar.gz Fetching with LWP: http://cpan.nas1.activestate.com/authors/id/S/SU/SULLR/CHECKSUMS Checksum for C:\cpanfly-5.18\var\cpan\sources\authors\id\S\SU\SULLR\IO-Socket-SSL-1.968.tar.gz ok IO-Socket-SSL-1.968/ IO-Socket-SSL-1.968/BUGS IO-Socket-SSL-1.968/t/ IO-Socket-SSL-1.968/t/core.t IO-Socket-SSL-1.968/t/verify_fingerprint.t IO-Socket-SSL-1.968/t/testlib.pl IO-Socket-SSL-1.968/t/acceptSSL-timeout.t IO-Socket-SSL-1.968/t/connectSSL-timeout.t IO-Socket-SSL-1.968/t/readline.t IO-Socket-SSL-1.968/t/auto_verify_hostname.t IO-Socket-SSL-1.968/t/dhe.t IO-Socket-SSL-1.968/t/01loadmodule.t IO-Socket-SSL-1.968/t/startssl-failed.t IO-Socket-SSL-1.968/t/verify_hostname.t IO-Socket-SSL-1.968/t/startssl.t IO-Socket-SSL-1.968/t/start-stopssl.t IO-Socket-SSL-1.968/t/compatibility.t IO-Socket-SSL-1.968/t/memleak_bad_handshake.t IO-Socket-SSL-1.968/t/ecdhe.t IO-Socket-SSL-1.968/t/nonblock.t IO-Socket-SSL-1.968/t/sni.t IO-Socket-SSL-1.968/t/io-socket-inet6.t IO-Socket-SSL-1.968/t/npn.t IO-Socket-SSL-1.968/t/external/ IO-Socket-SSL-1.968/t/external/usable_ca.t IO-Socket-SSL-1.968/t/io-socket-ip.t IO-Socket-SSL-1.968/t/signal-readline.t IO-Socket-SSL-1.968/t/sessions.t IO-Socket-SSL-1.968/t/mitm.t IO-Socket-SSL-1.968/t/sysread_write.t IO-Socket-SSL-1.968/t/cert_no_file.t IO-Socket-SSL-1.968/MANIFEST IO-Socket-SSL-1.968/README IO-Socket-SSL-1.968/example/ IO-Socket-SSL-1.968/example/ssl_mitm.pl IO-Socket-SSL-1.968/example/ssl_client.pl IO-Socket-SSL-1.968/example/lwp-with-verifycn.pl IO-Socket-SSL-1.968/example/async_https_server.pl IO-Socket-SSL-1.968/example/ssl_server.pl IO-Socket-SSL-1.968/certs/ IO-Socket-SSL-1.968/certs/client-key.pem IO-Socket-SSL-1.968/certs/server-wildcard.pem IO-Socket-SSL-1.968/certs/server-key.pem IO-Socket-SSL-1.968/certs/client-cert.pem IO-Socket-SSL-1.968/certs/proxyca.pem IO-Socket-SSL-1.968/certs/client-key.enc IO-Socket-SSL-1.968/certs/server-key.enc IO-Socket-SSL-1.968/certs/test-ca.pem IO-Socket-SSL-1.968/certs/my-ca.pem IO-Socket-SSL-1.968/certs/server-cert.pem IO-Socket-SSL-1.968/certs/server-rsa384-dh.pem IO-Socket-SSL-1.968/META.yml IO-Socket-SSL-1.968/Makefile.PL IO-Socket-SSL-1.968/docs/ IO-Socket-SSL-1.968/docs/debugging.txt IO-Socket-SSL-1.968/docs/net-ssley-ecdh.patch IO-Socket-SSL-1.968/util/ IO-Socket-SSL-1.968/util/export_certs.pl IO-Socket-SSL-1.968/META.json IO-Socket-SSL-1.968/lib/ IO-Socket-SSL-1.968/lib/IO/ IO-Socket-SSL-1.968/lib/IO/Socket/ IO-Socket-SSL-1.968/lib/IO/Socket/SSL.pm IO-Socket-SSL-1.968/lib/IO/Socket/SSL/ IO-Socket-SSL-1.968/lib/IO/Socket/SSL/Utils.pm IO-Socket-SSL-1.968/lib/IO/Socket/SSL/Intercept.pm IO-Socket-SSL-1.968/README.Win32 IO-Socket-SSL-1.968/Changes CPAN.pm: Building S/SU/SULLR/IO-Socket-SSL-1.968.tar.gz >>> C:\Perl-5.18\bin\perl.exe Makefile.PL Should I do external tests? These tests will fail if there is no internet connection or if a firewall blocks some traffic, does SSL interception or if a HTTP proxy is needed. [y/N] [n] n Checking if your kit is complete... Looks good Generating a dmake-style Makefile Writing Makefile for IO::Socket::SSL Writing MYMETA.yml and MYMETA.json >>> dmake cp lib/IO/Socket/SSL.pm blib\lib\IO\Socket\SSL.pm cp lib/IO/Socket/SSL/Utils.pm blib\lib\IO\Socket\SSL\Utils.pm cp lib/IO/Socket/SSL/Intercept.pm blib\lib\IO\Socket\SSL\Intercept.pm SULLR/IO-Socket-SSL-1.968.tar.gz dmake -- OK Running make test >>> dmake test TEST_VERBOSE=1 C:\Perl-5.18\bin\perl.exe "-MExtUtils::Command::MM" "-MTest::Harness" "-e" "undef *Test::Harness::Switches; test_harness(1, 'blib\lib', 'blib\arch')" t/*.t t/01loadmodule.t ........... 1..4 ok 1 ok 2 ok 3 ok 4 ok t/acceptSSL-timeout.t ...... 1..15 ok # listening @127.0.0.1:3574 # server >> OK << ok # [server] OK # server >> Waiting << ok # [server] Waiting # client_ssl >> OK << ok # [client_ssl] OK # server >> Connect from 127.0.0.1:3575 << ok # [server] Connect from # client_ssl >> Connected << ok # [client_ssl] Connected # server >> SSL Handshake OK << ok # [server] SSL Handshake OK # client_ssl >> Hi! << ok # [client_ssl] Hi! ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok t/auto_verify_hostname.t ... 1..30 ok #Server Initialization ok #connection to example.com/www failed ok #connection to server.local/ldap succeeded ok #received hallo ok #connection to server.local/www failed ok #connection to bla.server.local/www succeeded ok #received hallo ok #connection to www7.other.local/www succeeded ok #received hallo ok #connection to www7.other.local/ldap failed ok #connection to bla.server.local/ldap succeeded ok #received hallo ok #tcp connect ok #ssl upgrade of connection to example.com/www failed ok #tcp connect ok #ssl upgrade of connection to server.local/ldap succeeded ok #received hallo ok #tcp connect ok #ssl upgrade of connection to server.local/www failed ok #tcp connect ok #ssl upgrade of connection to bla.server.local/www succeeded ok #received hallo ok #tcp connect ok #ssl upgrade of connection to www7.other.local/www succeeded ok #received hallo ok #tcp connect ok #ssl upgrade of connection to www7.other.local/ldap failed ok #tcp connect ok #ssl upgrade of connection to bla.server.local/ldap succeeded ok #received hallo ok t/cert_no_file.t ........... 1..9 ok # [server] Server Initialization Using SSL_cert_file ok # [server] Server accepted Using SSL_cert_file ok # [client] client connected Using SSL_cert_file ok # [server] Server Initialization Using SSL_cert ok # [server] Server accepted Using SSL_cert ok # [client] client connected Using SSL_cert ok # [server] Server Initialization Empty SSL_cert ok # [server] Empty SSL_cert: accept failed ok # [client] Empty SSL_cert: connect failed ok t/compatibility.t .......... 1..9 ok # server create ok # ssl upgrade ok # class MyClass ok # issuer_name ok # subject_name ok # opened ok # socketToSSL ok # socket_to_SSL ok # upgrade is MyClass ok t/connectSSL-timeout.t ..... 1..16 ok # listening @127.0.0.1:3599 # server >> OK << ok # [server] OK # server >> Waiting << ok # [server] Waiting # client >> OK << ok # [client] OK # server >> Connect from 127.0.0.1:3600 << ok # [server] Connect from # client >> Connected << ok # [client] Connected # server >> Server SSL Handshake OK << ok # [server] Server SSL Handshake OK # client >> Client SSL Handshake OK << ok # [client] Client SSL Handshake OK # client >> Hi! << ok # [client] Hi! ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok t/core.t ................... 1..43 ok #Server Initialization ok #Server Fileno Check ok #Server non-SSL Client Check ok #Server Kill-client Check ok #Client non-SSL connection ok #Client Verify-sub Check ok #Client Verify-sub Check ok #Server Client Accept Check ok #Accept returning peer address check. ok #Server Client Fileno Check ok #Client Initialization ok #Client Fileno Check ok #Client Peer Certificate Check ok #Client Peer Certificate Issuer Check ok #Client Cipher Check ok #Server Peek Check ok #Server Pending Check ok #Server Sysread Check ok #Client Peek Check ok #Server Getline Check ok #Server Getc Check ok #Server Getlines Check 1 ok #Server Getlines Check 2 ok #Server Getlines Check 3 ok #Server Getlines Check 4 ok #Server Getlines Check 5 ok #Client Sysread Check ok #Client Getline Check ok #Client Getc Check ok #Client Getlines Check 1 ok #Client Getlines Check 2 ok #Client Getlines Check 3 ok #Client Getlines Check 4 ok #Client Getlines Check 5 ok #Client Finished Reading Check ok #Second Client Initialization ok #Client Verify-sub Check ok #Client Verify-sub Check ok #Peer address check ok #Server Client Opened Check 1 ok #Server Client Opened Check 2 ok #Client Init from Fileno Check ok #Client (fileno) Readline Check ok t/dhe.t .................... 1..3 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok t/ecdhe.t .................. skipped: no support for ecdh with this openssl/Net::SSLeay t/io-socket-inet6.t ........ skipped: will not work with Acme::Override::INET installed t/io-socket-ip.t ........... skipped: (no reason given) t/memleak_bad_handshake.t .. skipped: ps not implemented on this platform t/mitm.t ................... 1..8 ok # server ssl socket ok # proxy tcp socket ok # ssl connected to server ok # subject w/o mitm ok # issuer w/o mitm ok # ssl connected to proxy ok # subject w/ mitm ok # issuer w/ mitm ok t/nonblock.t ............... skipped: nonblocking does not work on Win32 t/npn.t .................... 1..5 ok # [server] Server Initialization at 127.0.0.1 # server at 127.0.0.1:3614 ok # [server] Server accepted ok # [server] negotiated two ok # [client] client connected ok # [client] negotiated two ok t/readline.t ............... 1..19 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok # [client] Test00 ok # [server] Server accepted ok # [client] client connected ok # [client] Test01 ok # [server] Server accepted ok # [client] client connected ok # [client] Test02 ok # [server] Server accepted ok # [client] client connected ok # [client] Test03 ok # [server] Server accepted ok # [client] client connected ok # [client] Test04 ok # [server] Server accepted ok # [client] client connected ok # [client] Test05 ok t/sessions.t ............... 1..35 ok #Server initialization ok #Context init ok #Superficial Cache Addition Test ok #Superficial Cache Addition Test 2 ok #Cache Keys Check 1 ok #Cache Keys Check 2 ok #Cache Head Check ok #Cache Link Check ok #Client init ok #Client init ok #Cache Keys Check 3 ok #Cache Removal Test ok #Cache Tail Check ok #Cache Insertion Test ok #Cache Entry Test 0 ok #Cache Entry Test 1 ok #Cache Entry Test 2 ok #Client init 2 ok #Cache Keys Check 4 ok #Cache Keys Check 5 ok #Second Cache Entry Test 0 ok #Server Read 0 ok #Server Write 0 ok #Write Test 0 ok #Read Test 0 ok #Second Cache Entry Test 1 ok #Server Read 1 ok #Server Write 1 ok #Write Test 1 ok #Read Test 1 ok #Second Cache Entry Test 2 ok #Server Read 2 ok #Server Write 2 ok #Write Test 2 ok #Read Test 2 ok t/signal-readline.t ........ skipped: signals not relevant on this platform t/sni.t .................... 1..17 ok # Server Initialization ok # client ssl connect server.local ok # client verify hostname in cert server.local ok # client ssl connect client.local ok # client verify hostname in cert client.local ok # client ssl connect smtp.mydomain.local ok # client verify hostname in cert smtp.mydomain.local ok # client ssl connect www13.other.local ok # client verify hostname in cert www13.other.local ok # server accept ok # server got SNI name server.local ok # server accept ok # server got SNI name client.local ok # server accept ok # server got SNI name smtp.mydomain.local ok # server accept ok # server got SNI name www13.other.local ok t/start-stopssl.t .......... 1..16 ok #listen ok #client connect ok # server::class=IO::Socket::SSL ok # client::start_SSL ok # client::class=IO::Socket::SSL ok #server::stop_SSL ok # class=IO::Socket::INET ok # client::stop_SSL ok # client::class=IO::Socket::INET ok # server::class=IO::Socket::SSL ok # client::start_SSL ok # client::class=IO::Socket::SSL ok #server::close ok # class=IO::Socket::SSL ok # client::close ok # client::class=IO::Socket::SSL ok t/startssl-failed.t ........ 1..9 ok #Server Initialization ok #tcp accept ok #send non-ssl data ok #client tcp connect ok #startssl client failed: SSL connect attempt failed with unknown error error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol ok #downgrade socket after error ok #received non-ssl data ok #send to server ok #client receive non-ssl data ok t/startssl.t ............... 1..9 ok #Server Initialization ok #Server Fileno Check ok #tcp accept ok #client tcp connect ok #sslify client ok #client reblessed as IO::Socket::SSL ok #sslify server ok #server reblessed as IO::Socket::SSL ok #received client message ok t/sysread_write.t .......... 1..9 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok # [server] partial read in sysread ok # [server] send ack back ok # [client] received ack ok # [client] send in time ok # [client] partial write in syswrite ok # TODO(win32): ok # [client] full write in write (18000) ok # Acme::Override::INET replaced IO::Socket::INET with IO::Socket::IP 0.29 t/verify_fingerprint.t ..... 1..6 ok 1 - accept fp1 for saddr1 ok 2 - accept fp2 for saddr2 ok 3 - reject fp2 for saddr1 ok 4 - reject fp1 for saddr2 ok 5 - accept fp1|fp2 for saddr1 ok 6 - accept fp1|fp2 for saddr2 ok t/verify_hostname.t ........ 1..43 ok #Server Initialization ok #client ssl connect ok #issuer ok #cn ok #*.server.local ok #127.0.0.1 ok #www*.other.local ok #smtp.mydomain.local ok #xn--lwe-sna.idntest.local ok #no more altSubjectNames ok #pass 127.0.0.1 smtp ok #pass 127.0.0.1 ldap ok #pass 127.0.0.1 www ok #pass server.local smtp ok #pass server.local ldap ok #fail server.local www ok #pass blafasel.server.local smtp ok #pass blafasel.server.local ldap ok #pass blafasel.server.local www ok #fail lala.blafasel.server.local smtp ok #fail lala.blafasel.server.local ldap ok #fail lala.blafasel.server.local www ok #fail www.other.local smtp ok #fail www.other.local ldap ok #fail www.other.local www ok #fail www-13.other.local smtp ok #fail www-13.other.local ldap ok #pass www-13.other.local www ok #fail www-13.lala.other.local smtp ok #fail www-13.lala.other.local ldap ok #fail www-13.lala.other.local www ok #pass smtp.mydomain.local smtp ok #pass smtp.mydomain.local ldap ok #pass smtp.mydomain.local www ok #pass xn--lwe-sna.idntest.local smtp ok #pass xn--lwe-sna.idntest.local ldap ok #pass xn--lwe-sna.idntest.local www ok #fail smtp.mydomain.localizing.useless.local smtp ok #fail smtp.mydomain.localizing.useless.local ldap ok #fail smtp.mydomain.localizing.useless.local www ok #pass löwe.idntest.local smtp ok #pass löwe.idntest.local ldap ok #pass löwe.idntest.local www ok All tests successful. Test Summary Report ------------------- t/sysread_write.t (Wstat: 0 Tests: 9 Failed: 0) TODO passed: 9 Files=25, Tests=305, 56 wallclock secs ( 0.17 usr + 0.06 sys = 0.23 CPU) Result: PASS SULLR/IO-Socket-SSL-1.968.tar.gz dmake test TEST_VERBOSE=1 -- OK Steffen Ullrich <Steffen_Ullrich@genua.de> Nearly transparent SSL encapsulation for IO::Socket::INET. >>> (cd C:\cpanfly-5.18\var\cpan\build\IO-Socket-SSL-1.968-pyTwqF && tar cvf - IO-Socket-SSL-1.968.ppd blib) | gzip -c >C:/cpanfly-5.18/var/REPO/S/SU/SULLR/IO-Socket-SSL-1.968.tar.gz IO-Socket-SSL-1.968.ppd blib/ blib/lib/ blib/lib/IO/ blib/lib/IO/Socket/ blib/lib/IO/Socket/SSL/ blib/lib/IO/Socket/SSL/Intercept.pm blib/lib/IO/Socket/SSL/Utils.pm blib/lib/IO/Socket/SSL.pm >>> mv C:\cpanfly-5.18\var\cpan\build\IO-Socket-SSL-1.968-pyTwqF/IO-Socket-SSL-1.968.ppd C:/cpanfly-5.18/var/REPO/S/SU/SULLR Finished 2014-03-13T03:34:06