PATH=C:\mingw\bin;C:\cygwin\bin;C:\cpanfly-5.20\var\megalib\bin;C:\Perl-5.20\site\bin;C:\Perl-5.20\bin;C:\cygwin\bin;C:\Program Files\Perforce;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\instantclient_11_2;C:\cygwin\bin;C:\Program Files\Perforce;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mysql\bin Start 2014-10-16T06:26:01 ActivePerl-2000 CPAN-2.00 LIB=C:\PROGRA~1\MICROS~3\VC98\Lib\PSDK PATH=C:/CPANFL~1.20/var/libs/bin;C:\mingw\bin;C:\cygwin\bin;C:\CPANFL~1.20\var\megalib\bin;C:\Perl-5.20\site\bin;C:\Perl-5.20\bin;C:\cygwin\bin;C:\PROGRA~1\Perforce;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WINDOW~2\v1.0;C:\WINDOWS\system32\WINDOW~2\v1.0;C:\INSTAN~1;C:\cygwin\bin;C:\PROGRA~1\Perforce;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WINDOW~2\v1.0;C:\WINDOWS\system32\WINDOW~2\v1.0;C:\mysql\bin Reading 'C:\cpanfly-5.20\var\cpan\Metadata' Database was generated on Thu, 16 Oct 2014 12:41:02 GMT Running make for S/SU/SULLR/IO-Socket-SSL-2.000.tar.gz Fetching with LWP: http://cpan.nas1.activestate.com/authors/id/S/SU/SULLR/IO-Socket-SSL-2.000.tar.gz Fetching with LWP: http://cpan.nas1.activestate.com/authors/id/S/SU/SULLR/CHECKSUMS Checksum for C:\cpanfly-5.20\var\cpan\sources\authors\id\S\SU\SULLR\IO-Socket-SSL-2.000.tar.gz ok IO-Socket-SSL-2.000/ IO-Socket-SSL-2.000/BUGS IO-Socket-SSL-2.000/README.Win32 IO-Socket-SSL-2.000/docs/ IO-Socket-SSL-2.000/docs/debugging.txt IO-Socket-SSL-2.000/META.json IO-Socket-SSL-2.000/util/ IO-Socket-SSL-2.000/util/analyze-ssl.pl IO-Socket-SSL-2.000/example/ IO-Socket-SSL-2.000/example/async_https_server.pl IO-Socket-SSL-2.000/example/ssl_mitm.pl IO-Socket-SSL-2.000/example/simulate_proxy.pl IO-Socket-SSL-2.000/example/lwp-with-verifycn.pl IO-Socket-SSL-2.000/example/ssl_client.pl IO-Socket-SSL-2.000/example/ssl_server.pl IO-Socket-SSL-2.000/README IO-Socket-SSL-2.000/MANIFEST IO-Socket-SSL-2.000/Changes IO-Socket-SSL-2.000/certs/ IO-Socket-SSL-2.000/certs/server-key.pem IO-Socket-SSL-2.000/certs/server-wildcard.pem IO-Socket-SSL-2.000/certs/server-rsa384-dh.pem IO-Socket-SSL-2.000/certs/server_enc.p12 IO-Socket-SSL-2.000/certs/client-key.enc IO-Socket-SSL-2.000/certs/my-ca.pem IO-Socket-SSL-2.000/certs/server-cert.der IO-Socket-SSL-2.000/certs/client-key.pem IO-Socket-SSL-2.000/certs/client-cert.pem IO-Socket-SSL-2.000/certs/server-key.der IO-Socket-SSL-2.000/certs/server-key.enc IO-Socket-SSL-2.000/certs/server-cert.pem IO-Socket-SSL-2.000/certs/test-ca.pem IO-Socket-SSL-2.000/certs/proxyca.pem IO-Socket-SSL-2.000/certs/server.p12 IO-Socket-SSL-2.000/Makefile.PL IO-Socket-SSL-2.000/t/ IO-Socket-SSL-2.000/t/signal-readline.t IO-Socket-SSL-2.000/t/sessions.t IO-Socket-SSL-2.000/t/io-socket-inet6.t IO-Socket-SSL-2.000/t/sni_verify.t IO-Socket-SSL-2.000/t/acceptSSL-timeout.t IO-Socket-SSL-2.000/t/public_suffix_lib_uri.t IO-Socket-SSL-2.000/t/nonblock.t IO-Socket-SSL-2.000/t/startssl.t IO-Socket-SSL-2.000/t/npn.t IO-Socket-SSL-2.000/t/verify_fingerprint.t IO-Socket-SSL-2.000/t/verify_hostname.t IO-Socket-SSL-2.000/t/public_suffix_lib.pl IO-Socket-SSL-2.000/t/connectSSL-timeout.t IO-Socket-SSL-2.000/t/readline.t IO-Socket-SSL-2.000/t/core.t IO-Socket-SSL-2.000/t/testlib.pl IO-Socket-SSL-2.000/t/dhe.t IO-Socket-SSL-2.000/t/compatibility.t IO-Socket-SSL-2.000/t/cert_formats.t IO-Socket-SSL-2.000/t/public_suffix_ssl.t IO-Socket-SSL-2.000/t/verify_hostname_standalone.t IO-Socket-SSL-2.000/t/01loadmodule.t IO-Socket-SSL-2.000/t/cert_no_file.t IO-Socket-SSL-2.000/t/public_suffix_lib_libidn.t IO-Socket-SSL-2.000/t/memleak_bad_handshake.t IO-Socket-SSL-2.000/t/startssl-failed.t IO-Socket-SSL-2.000/t/external/ IO-Socket-SSL-2.000/t/external/ocsp.t IO-Socket-SSL-2.000/t/external/usable_ca.t IO-Socket-SSL-2.000/t/sysread_write.t IO-Socket-SSL-2.000/t/sni.t IO-Socket-SSL-2.000/t/plain_upgrade_downgrade.t IO-Socket-SSL-2.000/t/io-socket-ip.t IO-Socket-SSL-2.000/t/public_suffix_lib_encode_idn.t IO-Socket-SSL-2.000/t/mitm.t IO-Socket-SSL-2.000/t/auto_verify_hostname.t IO-Socket-SSL-2.000/t/ecdhe.t IO-Socket-SSL-2.000/t/start-stopssl.t IO-Socket-SSL-2.000/lib/ IO-Socket-SSL-2.000/lib/IO/ IO-Socket-SSL-2.000/lib/IO/Socket/ IO-Socket-SSL-2.000/lib/IO/Socket/SSL/ IO-Socket-SSL-2.000/lib/IO/Socket/SSL/PublicSuffix.pm IO-Socket-SSL-2.000/lib/IO/Socket/SSL/Utils.pm IO-Socket-SSL-2.000/lib/IO/Socket/SSL/Intercept.pm IO-Socket-SSL-2.000/lib/IO/Socket/SSL.pm IO-Socket-SSL-2.000/lib/IO/Socket/SSL.pod IO-Socket-SSL-2.000/META.yml CPAN.pm: Building S/SU/SULLR/IO-Socket-SSL-2.000.tar.gz >>> C:\Perl-5.20\bin\perl.exe Makefile.PL Should I do external tests? These test will detect if there are network problems and fail soft, so please disable them only if you definitely don't want to have any network traffic to external sites. [Y/n] [y] y Checking if your kit is complete... Looks good Generating a dmake-style Makefile Writing Makefile for IO::Socket::SSL Writing MYMETA.yml and MYMETA.json >>> dmake cp lib/IO/Socket/SSL/Utils.pm blib\lib\IO\Socket\SSL\Utils.pm cp lib/IO/Socket/SSL.pm blib\lib\IO\Socket\SSL.pm cp lib/IO/Socket/SSL/Intercept.pm blib\lib\IO\Socket\SSL\Intercept.pm cp lib/IO/Socket/SSL.pod blib\lib\IO\Socket\SSL.pod cp lib/IO/Socket/SSL/PublicSuffix.pm blib\lib\IO\Socket\SSL\PublicSuffix.pm SULLR/IO-Socket-SSL-2.000.tar.gz dmake -- OK Running make test >>> dmake test TEST_VERBOSE=1 C:\Perl-5.20\bin\perl.exe "-MExtUtils::Command::MM" "-MTest::Harness" "-e" "undef *Test::Harness::Switches; test_harness(1, 'blib\lib', 'blib\arch')" t/*.t t/external/*.t # openssl version=0x1000109f # Net::SSLeay::VERSION=1.55 t/01loadmodule.t .................. 1..3 ok 1 - loaded ok 2 - IO::Socket::SSL::DEBUG 1 ok 3 - Net::SSLeay::trace 1 ok t/acceptSSL-timeout.t ............. 1..15 ok # listening @127.0.0.1:4133 # server >> OK Waiting << ok # [server] OK ok # [server] Waiting # client_ssl >> OK << ok # [client_ssl] OK # server >> Connect from 127.0.0.1:4134 << ok # [server] Connect from # client_ssl >> Connected << ok # [client_ssl] Connected # server >> SSL Handshake OK << ok # [server] SSL Handshake OK # client_ssl >> Hi! << ok # [client_ssl] Hi! ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok t/auto_verify_hostname.t .......... 1..30 ok #Server Initialization ok #connection to example.com/www failed ok #connection to server.local/ldap succeeded ok #received hallo ok #connection to server.local/www failed ok #connection to bla.server.local/www succeeded ok #received hallo ok #connection to www7.other.local/www succeeded ok #received hallo ok #connection to www7.other.local/ldap failed ok #connection to bla.server.local/ldap succeeded ok #received hallo ok #tcp connect ok #ssl upgrade of connection to example.com/www failed ok #tcp connect ok #ssl upgrade of connection to server.local/ldap succeeded ok #received hallo ok #tcp connect ok #ssl upgrade of connection to server.local/www failed ok #tcp connect ok #ssl upgrade of connection to bla.server.local/www succeeded ok #received hallo ok #tcp connect ok #ssl upgrade of connection to www7.other.local/www succeeded ok #received hallo ok #tcp connect ok #ssl upgrade of connection to www7.other.local/ldap failed ok #tcp connect ok #ssl upgrade of connection to bla.server.local/ldap succeeded ok #received hallo ok t/cert_formats.t .................. 1..6 ok 1 - [PEM] ssl connect sucess ok 2 - [PEM_one_file] ssl connect sucess ok 3 - [PEM_keyenc] ssl connect sucess ok 4 - [DER] ssl connect sucess ok 5 - [PKCS12] ssl connect sucess ok 6 - [PKCS12_enc] ssl connect sucess ok t/cert_no_file.t .................. 1..9 ok # [server] Server Initialization Using SSL_cert_file ok # [server] Server accepted Using SSL_cert_file ok # [client] client connected Using SSL_cert_file ok # [server] Server Initialization Using SSL_cert ok # [server] Server accepted Using SSL_cert ok # [client] client connected Using SSL_cert ok # [server] Server Initialization Empty SSL_cert ok # [server] Empty SSL_cert: accept failed ok # [client] Empty SSL_cert: connect failed ok t/compatibility.t ................. 1..9 ok # server create ok # socketToSSL ok # ssl upgrade ok # class MyClass ok # issuer_name ok # subject_name ok # opened ok # socket_to_SSL ok # upgrade is MyClass ok t/connectSSL-timeout.t ............ 1..16 ok # listening @127.0.0.1:4165 # server >> OK << ok # [server] OK # server >> Waiting << ok # [server] Waiting # client >> OK << ok # [client] OK # server >> Connect from 127.0.0.1:4166 << ok # [server] Connect from # client >> Connected << ok # [client] Connected # server >> Server SSL Handshake OK << ok # [server] Server SSL Handshake OK # client >> Client SSL Handshake OK << ok # [client] Client SSL Handshake OK # client >> Hi! << ok # [client] Hi! ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok # skip - TODO on win32 ok t/core.t .......................... 1..43 ok #Server Initialization ok #Server Fileno Check ok #Server non-SSL Client Check ok #Server Kill-client Check ok #Client non-SSL connection ok #Client Verify-sub Check ok #Client Verify-sub Check ok #Server Client Accept Check ok #Accept returning peer address check. ok #Server Client Fileno Check ok #Client Initialization ok #Client Fileno Check ok #Client Peer Certificate Check ok #Client Peer Certificate Issuer Check ok #Client Cipher Check ok #Server Peek Check ok #Server Pending Check ok #Server Sysread Check ok #Client Peek Check ok #Server Getline Check ok #Server Getc Check ok #Server Getlines Check 1 ok #Server Getlines Check 2 ok #Server Getlines Check 3 ok #Server Getlines Check 4 ok #Server Getlines Check 5 ok #Client Sysread Check ok #Client Getline Check ok #Client Getc Check ok #Client Getlines Check 1 ok #Client Getlines Check 2 ok #Client Getlines Check 3 ok #Client Getlines Check 4 ok #Client Getlines Check 5 ok #Client Finished Reading Check ok #Second Client Initialization ok #Client Verify-sub Check ok #Client Verify-sub Check ok #Peer address check ok #Server Client Opened Check 1 ok #Server Client Opened Check 2 ok #Client Init from Fileno Check ok #Client (fileno) Readline Check ok t/dhe.t ........................... 1..3 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok t/ecdhe.t ......................... skipped: no support for ecdh with this openssl/Net::SSLeay t/external/ocsp.t ................. skipped: no OCSP support # found 154 CA certs # have root CA for www.google.com in store # 5 connections to www.google.com ok # have root CA for www.yahoo.com in store # 5 connections to www.yahoo.com ok # have root CA for www.comdirect.de in store # 5 connections to www.comdirect.de ok # have root CA for meine.deutsche-bank.de in store # 5 connections to meine.deutsche-bank.de ok # have root CA for www.twitter.com in store # 5 connections to www.twitter.com ok # have root CA for www.facebook.com in store # 5 connections to www.facebook.com ok # have root CA for www.live.com in store # 5 connections to www.live.com ok t/external/usable_ca.t ............ 1..21 ok 1 # skip fingerprint mismatch - probably SSL interception ok 2 # skip fingerprint mismatch - probably SSL interception ok 3 # skip fingerprint mismatch - probably SSL interception ok 4 # skip fingerprint mismatch - probably SSL interception ok 5 # skip fingerprint mismatch - probably SSL interception ok 6 # skip fingerprint mismatch - probably SSL interception ok 7 # skip fingerprint mismatch - probably SSL interception ok 8 # skip fingerprint mismatch - probably SSL interception ok 9 # skip fingerprint mismatch - probably SSL interception ok 10 # skip fingerprint mismatch - probably SSL interception ok 11 # skip fingerprint mismatch - probably SSL interception ok 12 # skip fingerprint mismatch - probably SSL interception ok 13 # skip fingerprint mismatch - probably SSL interception ok 14 # skip fingerprint mismatch - probably SSL interception ok 15 # skip fingerprint mismatch - probably SSL interception ok 16 # skip fingerprint mismatch - probably SSL interception ok 17 # skip fingerprint mismatch - probably SSL interception ok 18 # skip fingerprint mismatch - probably SSL interception ok 19 # skip fingerprint mismatch - probably SSL interception ok 20 # skip fingerprint mismatch - probably SSL interception ok 21 # skip fingerprint mismatch - probably SSL interception ok t/io-socket-inet6.t ............... skipped: (no reason given) t/io-socket-ip.t .................. skipped: (no reason given) t/memleak_bad_handshake.t ......... skipped: ps not implemented on this platform t/mitm.t .......................... 1..8 ok # server ssl socket ok # proxy tcp socket ok # ssl connected to server ok # subject w/o mitm ok # issuer w/o mitm ok # ssl connected to proxy ok # subject w/ mitm ok # issuer w/ mitm ok t/nonblock.t ...................... skipped: nonblocking does not work on Win32 t/npn.t ........................... 1..5 ok # [server] Server Initialization at 127.0.0.1 # server at 127.0.0.1:4215 ok # [server] Server accepted ok # [server] negotiated two ok # [client] client connected ok # [client] negotiated two ok # -- test: newINET start_SSL stop_SSL start_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x160301 from client # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 connect_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 start_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # server accepted new client # wait for initial data from client # got 0x656e64 from client # client requested end of tests t/plain_upgrade_downgrade.t ....... 1..15 ok 1 - newINET ok 2 - start_SSL ok 3 - stop_SSL ok 4 - start_SSL ok 5 - newSSL ok 6 - stop_SSL ok 7 - connect_SSL ok 8 - newSSL:0 ok 9 - connect_SSL ok 10 - stop_SSL ok 11 - connect_SSL ok 12 - newSSL:0 ok 13 - start_SSL ok 14 - stop_SSL ok 15 - connect_SSL ok t/public_suffix_lib_encode_idn.t .. 1..83 ok 1 - create two-level ok 2 - com -> + com ok 3 - bar.com -> + bar.com ok 4 - www.bar.com -> www + bar.com ok 5 - www.foo.bar.com -> www.foo + bar.com ok 6 - uk -> + uk ok 7 - co.uk -> + co.uk ok 8 - www.co.uk -> + www.co.uk ok 9 - www.bar.co.uk -> www + bar.co.uk ok 10 - www.foo.bar.co.uk -> www.foo + bar.co.uk ok 11 - bl.uk -> + bl.uk ok 12 - www.bl.uk -> www + bl.uk ok 13 - www.bar.bl.uk -> www.bar + bl.uk ok 14 - www.foo.bar.bl.uk -> www.foo.bar + bl.uk ok 15 ok 16 ok 17 ok 18 ok 19 ok 20 ok 21 ok 22 ok 23 ok 24 ok 25 ok 26 ok 27 ok 28 ok 29 ok 30 ok 31 ok 32 ok 33 ok 34 ok 35 ok 36 ok 37 ok 38 ok 39 ok 40 ok 41 ok 42 ok 43 ok 44 ok 45 ok 46 ok 47 ok 48 ok 49 ok 50 ok 51 ok 52 ok 53 ok 54 ok 55 ok 56 ok 57 ok 58 ok 59 ok 60 ok 61 ok 62 ok 63 ok 64 ok 65 ok 66 ok 67 ok 68 ok 69 ok 70 ok 71 ok 72 ok 73 ok 74 ok 75 ok 76 ok 77 ok 78 ok 79 ok 80 ok 81 ok 82 ok 83 ok t/public_suffix_lib_libidn.t ...... 1..83 ok 1 - create two-level ok 2 - com -> + com ok 3 - bar.com -> + bar.com ok 4 - www.bar.com -> www + bar.com ok 5 - www.foo.bar.com -> www.foo + bar.com ok 6 - uk -> + uk ok 7 - co.uk -> + co.uk ok 8 - www.co.uk -> + www.co.uk ok 9 - www.bar.co.uk -> www + bar.co.uk ok 10 - www.foo.bar.co.uk -> www.foo + bar.co.uk ok 11 - bl.uk -> + bl.uk ok 12 - www.bl.uk -> www + bl.uk ok 13 - www.bar.bl.uk -> www.bar + bl.uk ok 14 - www.foo.bar.bl.uk -> www.foo.bar + bl.uk ok 15 ok 16 ok 17 ok 18 ok 19 ok 20 ok 21 ok 22 ok 23 ok 24 ok 25 ok 26 ok 27 ok 28 ok 29 ok 30 ok 31 ok 32 ok 33 ok 34 ok 35 ok 36 ok 37 ok 38 ok 39 ok 40 ok 41 ok 42 ok 43 ok 44 ok 45 ok 46 ok 47 ok 48 ok 49 ok 50 ok 51 ok 52 ok 53 ok 54 ok 55 ok 56 ok 57 ok 58 ok 59 ok 60 ok 61 ok 62 ok 63 ok 64 ok 65 ok 66 ok 67 ok 68 ok 69 ok 70 ok 71 ok 72 ok 73 ok 74 ok 75 ok 76 ok 77 ok 78 ok 79 ok 80 ok 81 ok 82 # skip no IDN support with Net::LibIDN ok 83 # skip no IDN support with Net::LibIDN ok t/public_suffix_lib_uri.t ......... 1..83 ok 1 - create two-level ok 2 - com -> + com ok 3 - bar.com -> + bar.com ok 4 - www.bar.com -> www + bar.com ok 5 - www.foo.bar.com -> www.foo + bar.com ok 6 - uk -> + uk ok 7 - co.uk -> + co.uk ok 8 - www.co.uk -> + www.co.uk ok 9 - www.bar.co.uk -> www + bar.co.uk ok 10 - www.foo.bar.co.uk -> www.foo + bar.co.uk ok 11 - bl.uk -> + bl.uk ok 12 - www.bl.uk -> www + bl.uk ok 13 - www.bar.bl.uk -> www.bar + bl.uk ok 14 - www.foo.bar.bl.uk -> www.foo.bar + bl.uk ok 15 ok 16 ok 17 ok 18 ok 19 ok 20 ok 21 ok 22 ok 23 ok 24 ok 25 ok 26 ok 27 ok 28 ok 29 ok 30 ok 31 ok 32 ok 33 ok 34 ok 35 ok 36 ok 37 ok 38 ok 39 ok 40 ok 41 ok 42 ok 43 ok 44 ok 45 ok 46 ok 47 ok 48 ok 49 ok 50 ok 51 ok 52 ok 53 ok 54 ok 55 ok 56 ok 57 ok 58 ok 59 ok 60 ok 61 ok 62 ok 63 ok 64 ok 65 ok 66 ok 67 ok 68 ok 69 ok 70 ok 71 ok 72 ok 73 ok 74 ok 75 ok 76 ok 77 ok 78 ok 79 ok 80 ok 81 ok 82 ok 83 ok t/public_suffix_ssl.t ............. 1..24 ok 1 - ssl com against * -> fail (SSL connect attempt failed error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed) ok 2 - ssl com against com -> ok ok 3 - ssl googleapis.com against *.com -> fail (SSL connect attempt failed error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed) ok 4 - ssl googleapis.com against googleapis.com -> ok ok 5 - ssl ajax.googleapis.com against *.googleapis.com -> ok ok 6 - ssl google.com against *.com -> fail (SSL connect attempt failed error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed) ok 7 - ssl google.com against google.com -> ok ok 8 - ssl www.google.com against *.google.com -> ok ok 9 - ssl www.bar.com against *.bar.com -> ok ok 10 - ssl www.foo.bar.com against *.foo.bar.com -> ok ok 11 - ssl www.foo.co.uk against *.foo.co.uk -> ok ok 12 - ssl www.co.uk against *.co.uk -> fail (SSL connect attempt failed error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed) ok 13 - ssl co.uk against *.uk -> fail (SSL connect attempt failed error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed) ok 14 - ssl bl.uk against bl.uk -> ok ok 15 - ssl www.bl.uk against *.bl.uk -> ok ok 16 - ssl bar.kobe.jp against *.kobe.jp -> fail (SSL connect attempt failed error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed) ok 17 - ssl foo.bar.kobe.jp against *.bar.kobe.jp -> fail (SSL connect attempt failed error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed) ok 18 - ssl www.foo.bar.kobe.jp against *.foo.bar.kobe.jp -> ok ok 19 - ssl city.kobe.jp against *.kobe.jp -> fail (SSL connect attempt failed error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed) ok 20 - ssl city.kobe.jp against city.kobe.jp -> ok ok 21 - ssl www.city.kobe.jp against *.city.kobe.jp -> ok ok 22 - ssl nodomain against * -> fail (SSL connect attempt failed error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed) ok 23 - ssl foo.nodomain against *.nodomain -> fail (SSL connect attempt failed error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed) ok 24 - ssl www.foo.nodomain against *.foo.nodomain -> ok ok t/readline.t ...................... 1..19 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok # [client] Test00 ok # [server] Server accepted ok # [client] client connected ok # [client] Test01 ok # [server] Server accepted ok # [client] client connected ok # [client] Test02 ok # [server] Server accepted ok # [client] client connected ok # [client] Test03 ok # [server] Server accepted ok # [client] client connected ok # [client] Test04 ok # [server] Server accepted ok # [client] client connected ok # [client] Test05 ok t/sessions.t ...................... 1..35 ok #Server initialization ok #Context init ok #Superficial Cache Addition Test ok #Superficial Cache Addition Test 2 ok #Cache Keys Check 1 ok #Cache Keys Check 2 ok #Cache Head Check ok #Cache Link Check ok #Client init ok #Client init ok #Cache Keys Check 3 ok #Cache Removal Test ok #Cache Tail Check ok #Cache Insertion Test ok #Cache Entry Test 0 ok #Cache Entry Test 1 ok #Cache Entry Test 2 ok #Client init 2 ok #Cache Keys Check 4 ok #Cache Keys Check 5 ok #Second Cache Entry Test 0 ok #Server Read 0 ok #Server Write 0 ok #Write Test 0 ok #Read Test 0 ok #Second Cache Entry Test 1 ok #Server Read 1 ok #Server Write 1 ok #Write Test 1 ok #Read Test 1 ok #Second Cache Entry Test 2 ok #Server Read 2 ok #Server Write 2 ok #Write Test 2 ok #Read Test 2 ok t/signal-readline.t ............... skipped: signals not relevant on this platform t/sni.t ........................... 1..17 ok # Server Initialization ok # client ssl connect server.local ok # client verify hostname in cert server.local ok # client ssl connect client.local ok # client verify hostname in cert client.local ok # client ssl connect smtp.mydomain.local ok # client verify hostname in cert smtp.mydomain.local ok # client ssl connect www13.other.local ok # client verify hostname in cert www13.other.local ok # server accept ok # server got SNI name server.local ok # server accept ok # server got SNI name client.local ok # server accept ok # server got SNI name smtp.mydomain.local ok # server accept ok # server got SNI name www13.other.local ok t/sni_verify.t .................... 1..17 ok # Server Initialization ok # client ssl connect server.local ok # client verify hostname in cert server.local ok # client ssl connect client.local ok # client verify hostname in cert client.local ok # client ssl connect smtp.mydomain.local ok # client verify hostname in cert smtp.mydomain.local ok # client ssl connect www13.other.local ok # client verify hostname in cert www13.other.local ok # server accept ok # server got SNI name server.local ok # server accept ok # server got SNI name client.local ok # server accept ok # server got SNI name smtp.mydomain.local ok # server accept ok # server got SNI name www13.other.local ok t/start-stopssl.t ................. 1..16 ok #listen ok #client connect ok # server::class=IO::Socket::SSL ok # client::start_SSL ok # client::class=IO::Socket::SSL ok #server::stop_SSL ok # class=IO::Socket::INET ok # client::stop_SSL ok # client::class=IO::Socket::INET ok # server::class=IO::Socket::SSL ok # client::start_SSL ok # client::class=IO::Socket::SSL ok #server::close ok # class=IO::Socket::SSL ok # client::close ok # client::class=IO::Socket::SSL ok t/startssl-failed.t ............... 1..9 ok #Server Initialization ok #tcp accept ok #send non-ssl data ok #client tcp connect ok #startssl client failed: SSL connect attempt failed error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol ok #downgrade socket after error ok #received non-ssl data ok #send to server ok #client receive non-ssl data ok t/startssl.t ...................... 1..9 ok #Server Initialization ok #Server Fileno Check ok #tcp accept ok #client tcp connect ok #sslify server ok #server reblessed as IO::Socket::SSL ok #sslify client ok #client reblessed as IO::Socket::SSL ok #received client message ok t/sysread_write.t ................. 1..9 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok # [server] partial read in sysread ok # [server] send ack back ok # [client] received ack ok # [client] send in time ok # [client] partial write in syswrite ok # TODO(win32): ok # [client] full write in write (18000) ok t/verify_fingerprint.t ............ 1..12 ok 1 - accept fp1 for saddr1 ok 2 - accept fp2 for saddr2 ok 3 - reject ifp2 for saddr2 ok 4 - reject fp2 for saddr1 ok 5 - reject fp1 for saddr2 ok 6 - accept fp1|fp2 for saddr1 ok 7 - accept fp1|fp2 for saddr2 ok 8 - accept fp2 for saddr2 even if ca1 given ok 9 - accept ca2 for saddr2 ok 10 - reject ca2 for saddr1 ok 11 - accept ca[12] for saddr1 ok 12 - reject non-ca cert1 as ca for saddr1 ok t/verify_hostname.t ............... 1..43 ok #Server Initialization ok #client ssl connect ok #issuer ok #cn ok #*.server.local ok #127.0.0.1 ok #www*.other.local ok #smtp.mydomain.local ok #xn--lwe-sna.idntest.local ok #no more altSubjectNames ok #pass 127.0.0.1 smtp ok #pass 127.0.0.1 ldap ok #pass 127.0.0.1 www ok #pass server.local smtp ok #pass server.local ldap ok #fail server.local www ok #pass blafasel.server.local smtp ok #pass blafasel.server.local ldap ok #pass blafasel.server.local www ok #fail lala.blafasel.server.local smtp ok #fail lala.blafasel.server.local ldap ok #fail lala.blafasel.server.local www ok #fail www.other.local smtp ok #fail www.other.local ldap ok #fail www.other.local www ok #fail www-13.other.local smtp ok #fail www-13.other.local ldap ok #pass www-13.other.local www ok #fail www-13.lala.other.local smtp ok #fail www-13.lala.other.local ldap ok #fail www-13.lala.other.local www ok #pass smtp.mydomain.local smtp ok #pass smtp.mydomain.local ldap ok #pass smtp.mydomain.local www ok #pass xn--lwe-sna.idntest.local smtp ok #pass xn--lwe-sna.idntest.local ldap ok #pass xn--lwe-sna.idntest.local www ok #fail smtp.mydomain.localizing.useless.local smtp ok #fail smtp.mydomain.localizing.useless.local ldap ok #fail smtp.mydomain.localizing.useless.local www ok #pass löwe.idntest.local smtp ok #pass löwe.idntest.local ldap ok #pass löwe.idntest.local www ok t/verify_hostname_standalone.t .... 1..78 ok 1 - 1|foo.com: cn=foo.com san= ok 2 - 1|f: cn=f san= ok 3 - 0|h: cn=i san= ok 4 - 1|bar.foo.com: cn=*.foo.com san= ok 5 - 1|www.test.fr: cn=common.name san=DNS:*.test.com,DNS:*.test.co.uk,DNS:*.test.de,DNS:*.test.fr ok 6 - 1|wwW.tESt.fr: cn=common.name san=DNS:*.*,DNS:*.test.de,DNS:*.test.FR,DNS:www ok 7 - 0|f.uk: cn=.uk san= ok 8 - 0|w.bar.foo.com: cn=?.bar.foo.com san= ok 9 - 0|www.foo.com: cn=(www|ftp).foo.com san= ok 10 - 0|www.foo.com: cn=www.foo.com\x00 san= ok 11 - 0|www.house.example: cn=ww.house.example san= ok 12 - 0|test.org: cn= san=DNS:www.test.org,DNS:*.test.org,DNS:*.org ok 13 - 0|w.bar.foo.com: cn=w*.bar.foo.com san= ok 14 - 0|www.bar.foo.com: cn=ww*ww.bar.foo.com san= ok 15 - 0|wwww.bar.foo.com: cn=ww*ww.bar.foo.com san= ok 16 - 1|wwww.bar.foo.com: cn=w*w.bar.foo.com san= ok 17 - 0|wwww.bar.foo.com: cn=w*w.bar.foo.c0m san= ok 18 - 1|WALLY.bar.foo.com: cn=wa*.bar.foo.com san= ok 19 - 1|wally.bar.foo.com: cn=*Ly.bar.foo.com san= ok 20 - 0|www.test.co.jp: cn=www.test.co.jp san=DNS:*.test.de,DNS:*.jp,DNS:www.test.co.uk,DNS:www.*.co.jp ok 21 - 0|www.bar.foo.com: cn=www.bar.foo.com san=DNS:*.foo.com,DNS:*.*.foo.com,DNS:*.*.bar.foo.com,DNS:*..bar.foo.com ok 22 - 1|www.bath.org: cn=www.bath.org san=IP:20.30.40.50 ok 23 - 0|66.77.88.99: cn=www.bath.org san=DNS:www.bath.org ok 24 - 1|xn--poema-9qae5a.com.br: cn=xn--poema-9qae5a.com.br san= ok 25 - 1|www.xn--poema-9qae5a.com.br: cn=*.xn--poema-9qae5a.com.br san= ok 26 - 0|xn--poema-9qae5a.com.br: cn= san=DNS:*.xn--poema-9qae5a.com.br,DNS:xn--poema-*.com.br,DNS:xn--*-9qae5a.com.br,DNS:*--poema-9qae5a.com.br ok 27 - 1|xn--poema-9qae5a.foo.com.br: cn=*.foo.com.br san= ok 28 - 1|foo.example.com: cn=*.example.com san= ok 29 - 0|bar.foo.example.com: cn=*.example.com san= ok 30 - 0|example.com: cn=*.example.com san= ok 31 - 1|baz1.example.net: cn=baz*.example.net san= ok 32 - 1|foobaz.example.net: cn=*baz.example.net san= ok 33 - 1|buzz.example.net: cn=b*z.example.net san= ok 34 - 1|h.foo.com: cn=*.foo.com san= ok 35 - 0|foo.com: cn=*.com san= ok 36 - 0|foo.us: cn=*.us san= ok 37 - 0|foo: cn=* san= ok 38 - 0|foo.example.com: cn=*.*.com san= ok 39 - 0|foo.bar.example.com: cn=*.bar.*.com san= ok 40 - 1|foo.com: cn=foo.com. san= ok 41 - 1|foo.com.: cn=foo.com san= ok 42 - 1|foo.com.: cn=foo.com. san= ok 43 - 1|f: cn=f. san= ok 44 - 1|f.: cn=f san= ok 45 - 1|f.: cn=f. san= ok 46 - 1|www-3.bar.foo.com: cn=*.bar.foo.com. san= ok 47 - 1|www-3.bar.foo.com.: cn=*.bar.foo.com san= ok 48 - 1|www-3.bar.foo.com.: cn=*.bar.foo.com. san= ok 49 - 0|.: cn=. san= ok 50 - 0|example.com: cn=*.com. san= ok 51 - 0|example.com.: cn=*.com san= ok 52 - 0|example.com.: cn=*.com. san= ok 53 - 0|foo.: cn=*. san= ok 54 - 1|127.0.0.1: cn=127.0.0.1 san= ok 55 - 1|192.168.1.1: cn=192.168.1.1 san= ok 56 - 0|192.169.1.1: cn=192.168.1.1 san= ok 57 - 0|12.19.1.1: cn=12.19.1.1/255.255.255.0 san= ok 58 - 0|FEDC:ba98:7654:3210:FEDC:BA98:7654:3210: cn=FEDC:BA98:7654:3210:FEDC:ba98:7654:3210 san= ok 59 - 0|1111:2222:3333:4444:5555:6666:7777:8888: cn=1111:2222:3333:4444:5555:6666:7777:8888 san= ok 60 - 0|::192.9.5.5: cn=[::192.9.5.5] san= ok 61 - 0|::192.9.5.5: cn=*.9.5.5 san= ok 62 - 0|2010:836B:4179::836B:4179: cn=*:836B:4179::836B:4179 san= ok 63 - 0|192.168.1.11: cn=*.168.1.11 san= ok 64 - 0|FEDC:BA98:7654:3210:FEDC:BA98:7654:3210: cn=*.] san= ok 65 - 1|10.1.2.3: cn= san=IP:10.1.2.3 ok 66 - 1|10.1.2.7: cn=10.1.2.7 san=IP:10.1.2.6,IP:10.1.2.8 ok 67 - 0|10.1.2.8: cn=10.20.2.8 san=DNS:foo ok 68 - 1|::4.5.6.7: cn= san=IP:0000:0000:0000:0000:0000:0000:0405:0607 ok 69 - 0|::6.7.8.9: cn=::6.7.8.9 san=DNS:::6.7.8.9,IP:0000:0000:0000:0000:0000:0000:0607:0808,IP:0000:0000:0000:0000:0000:0000:0607:080a,IP:ff00:0000:0000:0000:0000:0000:0607:0809,IP:6.7.8.9 ok 70 - 1|FE80::200:f8ff:fe21:67cf: cn=no.common.name san=IP:0000:0000:0000:0000:0000:0000:0607:0808,IP:fe80:0000:0000:0000:0200:f8ff:fe21:67cf,IP:ff00:0000:0000:0000:0000:0000:0607:08ff,IP:10.0.0.1 ok 71 - 0|12345.6: cn=12345.6 san= ok 72 - 0|121.2.3.512: cn= san=DNS:1*1.2.3.512,DNS:*1.2.3.512,DNS:1*.2.3.512,DNS:*.2.3.512,IP:121.2.3.0 ok 73 - 0|1.2.3.4.5.6: cn=*.2.3.4.5.6 san= ok 74 - 0|www.*.com: cn=www.*.com san= ok 75 - 0|w$w.f.com: cn=w$w.f.com san= ok 76 - 0|nocolonallowed:example: cn= san=DNS:nocolonallowed:example ok 77 - 0|www-1.[::FFFF:129.144.52.38]: cn=*.[::FFFF:129.144.52.38] san= ok 78 - 0|[::4.5.6.9]: cn= san=IP:0000:0000:0000:0000:0000:0000:0405:0609 ok All tests successful. Test Summary Report ------------------- t/sysread_write.t (Wstat: 0 Tests: 9 Failed: 0) TODO passed: 9 Files=35, Tests=720, 53 wallclock secs ( 0.23 usr + 0.03 sys = 0.27 CPU) Result: PASS SULLR/IO-Socket-SSL-2.000.tar.gz dmake test TEST_VERBOSE=1 -- OK Steffen Ullrich <Steffen_Ullrich@genua.de> Nearly transparent SSL encapsulation for IO::Socket::INET. >>> (cd C:\cpanfly-5.20\var\cpan\build\IO-Socket-SSL-2.000-aMF9XP && tar cvf - IO-Socket-SSL-2.000.ppd blib) | gzip -c >C:/cpanfly-5.20/var/REPO/S/SU/SULLR/IO-Socket-SSL-2.000.tar.gz IO-Socket-SSL-2.000.ppd blib/ blib/lib/ blib/lib/IO/ blib/lib/IO/Socket/ blib/lib/IO/Socket/SSL/ blib/lib/IO/Socket/SSL/Intercept.pm blib/lib/IO/Socket/SSL/PublicSuffix.pm blib/lib/IO/Socket/SSL/Utils.pm blib/lib/IO/Socket/SSL.pm blib/lib/IO/Socket/SSL.pod >>> mv C:\cpanfly-5.20\var\cpan\build\IO-Socket-SSL-2.000-aMF9XP/IO-Socket-SSL-2.000.ppd C:/cpanfly-5.20/var/REPO/S/SU/SULLR Finished 2014-10-16T06:27:04