PATH=/usr/bin:/bin:/Users/fly2000/cpanfly-5.20/var/megalib/bin Start 2016-07-13T10:07:18 ActivePerl-2000 CPAN-2.10 Reading '/Users/fly2000/cpanfly-5.20/var/cpan/Metadata' Database was generated on Wed, 13 Jul 2016 05:41:02 GMT Fetching with LWP: http://ppm.activestate.com/CPAN/authors/id/S/SU/SULLR/IO-Socket-SSL-2.032.tar.gz Fetching with LWP: http://ppm.activestate.com/CPAN/authors/id/S/SU/SULLR/CHECKSUMS Checksum for /Users/fly2000/cpanfly-5.20/var/cpan/sources/authors/id/S/SU/SULLR/IO-Socket-SSL-2.032.tar.gz ok IO-Socket-SSL-2.032/ IO-Socket-SSL-2.032/BUGS IO-Socket-SSL-2.032/README.Win32 IO-Socket-SSL-2.032/docs/ IO-Socket-SSL-2.032/docs/debugging.txt IO-Socket-SSL-2.032/META.json IO-Socket-SSL-2.032/example/ IO-Socket-SSL-2.032/example/async_https_server.pl IO-Socket-SSL-2.032/example/ssl_mitm.pl IO-Socket-SSL-2.032/example/simulate_proxy.pl IO-Socket-SSL-2.032/example/lwp-with-verifycn.pl IO-Socket-SSL-2.032/example/ssl_client.pl IO-Socket-SSL-2.032/example/ssl_server.pl IO-Socket-SSL-2.032/README IO-Socket-SSL-2.032/MANIFEST IO-Socket-SSL-2.032/Changes IO-Socket-SSL-2.032/certs/ IO-Socket-SSL-2.032/certs/server-key.pem IO-Socket-SSL-2.032/certs/server-wildcard.pem IO-Socket-SSL-2.032/certs/server-rsa384-dh.pem IO-Socket-SSL-2.032/certs/server_enc.p12 IO-Socket-SSL-2.032/certs/client-key.enc IO-Socket-SSL-2.032/certs/my-ca.pem IO-Socket-SSL-2.032/certs/server-cert.der IO-Socket-SSL-2.032/certs/client-key.pem IO-Socket-SSL-2.032/certs/client-cert.pem IO-Socket-SSL-2.032/certs/server-key.der IO-Socket-SSL-2.032/certs/server-key.enc IO-Socket-SSL-2.032/certs/server-cert.pem IO-Socket-SSL-2.032/certs/test-ca.pem IO-Socket-SSL-2.032/certs/proxyca.pem IO-Socket-SSL-2.032/certs/server.p12 IO-Socket-SSL-2.032/Makefile.PL IO-Socket-SSL-2.032/t/ IO-Socket-SSL-2.032/t/signal-readline.t IO-Socket-SSL-2.032/t/sessions.t IO-Socket-SSL-2.032/t/io-socket-inet6.t IO-Socket-SSL-2.032/t/sni_verify.t IO-Socket-SSL-2.032/t/acceptSSL-timeout.t IO-Socket-SSL-2.032/t/public_suffix_lib_uri.t IO-Socket-SSL-2.032/t/nonblock.t IO-Socket-SSL-2.032/t/startssl.t IO-Socket-SSL-2.032/t/npn.t IO-Socket-SSL-2.032/t/verify_fingerprint.t IO-Socket-SSL-2.032/t/verify_hostname.t IO-Socket-SSL-2.032/t/public_suffix_lib.pl IO-Socket-SSL-2.032/t/connectSSL-timeout.t IO-Socket-SSL-2.032/t/readline.t IO-Socket-SSL-2.032/t/core.t IO-Socket-SSL-2.032/t/testlib.pl IO-Socket-SSL-2.032/t/dhe.t IO-Socket-SSL-2.032/t/compatibility.t IO-Socket-SSL-2.032/t/cert_formats.t IO-Socket-SSL-2.032/t/public_suffix_ssl.t IO-Socket-SSL-2.032/t/verify_hostname_standalone.t IO-Socket-SSL-2.032/t/01loadmodule.t IO-Socket-SSL-2.032/t/protocol_version.t IO-Socket-SSL-2.032/t/cert_no_file.t IO-Socket-SSL-2.032/t/public_suffix_lib_libidn.t IO-Socket-SSL-2.032/t/alpn.t IO-Socket-SSL-2.032/t/memleak_bad_handshake.t IO-Socket-SSL-2.032/t/startssl-failed.t IO-Socket-SSL-2.032/t/external/ IO-Socket-SSL-2.032/t/external/ocsp.t IO-Socket-SSL-2.032/t/external/usable_ca.t IO-Socket-SSL-2.032/t/sysread_write.t IO-Socket-SSL-2.032/t/sni.t IO-Socket-SSL-2.032/t/plain_upgrade_downgrade.t IO-Socket-SSL-2.032/t/io-socket-ip.t IO-Socket-SSL-2.032/t/public_suffix_lib_encode_idn.t IO-Socket-SSL-2.032/t/mitm.t IO-Socket-SSL-2.032/t/auto_verify_hostname.t IO-Socket-SSL-2.032/t/ecdhe.t IO-Socket-SSL-2.032/t/start-stopssl.t IO-Socket-SSL-2.032/lib/ IO-Socket-SSL-2.032/lib/IO/ IO-Socket-SSL-2.032/lib/IO/Socket/ IO-Socket-SSL-2.032/lib/IO/Socket/SSL/ IO-Socket-SSL-2.032/lib/IO/Socket/SSL/PublicSuffix.pm IO-Socket-SSL-2.032/lib/IO/Socket/SSL/Utils.pm IO-Socket-SSL-2.032/lib/IO/Socket/SSL/Intercept.pm IO-Socket-SSL-2.032/lib/IO/Socket/SSL.pm IO-Socket-SSL-2.032/lib/IO/Socket/SSL.pod IO-Socket-SSL-2.032/META.yml Configuring S/SU/SULLR/IO-Socket-SSL-2.032.tar.gz with Makefile.PL >>> /Users/fly2000/ap2000-298465/bin/perl-dynamic Makefile.PL Checking if your kit is complete... Looks good Have /Users/fly2000/cpanfly-5.20/var/megalib Want /Users/fly2000/ap2000-298465/lib Your perl and your Config.pm seem to have different ideas about the architecture they are running on. Perl thinks: [megalib] Config says: [darwin-thread-multi-2level] This may or may not cause problems. Please check your installation of perl if you have problems building this extension. Generating a Unix-style Makefile Writing Makefile for IO::Socket::SSL Writing MYMETA.yml and MYMETA.json SULLR/IO-Socket-SSL-2.032.tar.gz /Users/fly2000/ap2000-298465/bin/perl-dynamic Makefile.PL -- OK Running make for S/SU/SULLR/IO-Socket-SSL-2.032.tar.gz >>> make cp lib/IO/Socket/SSL.pod blib/lib/IO/Socket/SSL.pod cp lib/IO/Socket/SSL.pm blib/lib/IO/Socket/SSL.pm cp lib/IO/Socket/SSL/Utils.pm blib/lib/IO/Socket/SSL/Utils.pm cp lib/IO/Socket/SSL/Intercept.pm blib/lib/IO/Socket/SSL/Intercept.pm cp lib/IO/Socket/SSL/PublicSuffix.pm blib/lib/IO/Socket/SSL/PublicSuffix.pm Manifying 4 pod documents SULLR/IO-Socket-SSL-2.032.tar.gz make -- OK Running make test >>> make test TEST_VERBOSE=1 PERL_DL_NONLAZY=1 "/Users/fly2000/ap2000-298465/bin/perl-dynamic" "-MExtUtils::Command::MM" "-MTest::Harness" "-e" "undef *Test::Harness::Switches; test_harness(1, 'blib/lib', 'blib/arch')" t/*.t t/external/*.t # openssl version=0x1000206f # Net::SSLeay version=1.74 # parent IO::Socket::IP version=0.37 t/01loadmodule.t .................. 1..3 ok 1 - loaded ok 2 - IO::Socket::SSL::DEBUG 1 ok 3 - Net::SSLeay::trace 1 ok t/acceptSSL-timeout.t ............. 1..15 ok # listening @127.0.0.1:64655 # server >> OK Waiting << ok # [server] OK ok # [server] Waiting # client_ssl >> OK << ok # [client_ssl] OK # server >> Connect from 127.0.0.1:64656 << ok # [server] Connect from # client_ssl >> Connected << ok # [client_ssl] Connected # server >> SSL Handshake OK << ok # [server] SSL Handshake OK # client_ssl >> Hi! << ok # [client_ssl] Hi! ok # listening @127.0.0.1:64657 # server >> OK Waiting << ok # [server] OK ok # [server] Waiting # client_no_ssl >> OK << ok # [client_no_ssl] OK # server >> Connect from 127.0.0.1:64658 << ok # [server] Connect from # client_no_ssl >> Connected << ok # [client_no_ssl] Connected # server >> SSL Handshake FAILED - Resource temporarily unavailable << ok # [server] SSL Handshake FAILED ok t/alpn.t .......................... 1..5 ok # [server] Server Initialization at 127.0.0.1 # server at 127.0.0.1:64659 ok # [client] client connected ok # [client] negotiated two ok # [server] Server accepted ok # [server] negotiated two ok t/auto_verify_hostname.t .......... 1..30 ok 1 - Server Initialization ok 2 - connection to example.com/www failed ok 3 - connection to server.local/ldap succeeded ok 4 - received hallo ok 5 - connection to server.local/www failed ok 6 - connection to bla.server.local/www succeeded ok 7 - received hallo ok 8 - connection to www7.other.local/www succeeded ok 9 - received hallo ok 10 - connection to www7.other.local/ldap failed ok 11 - connection to bla.server.local/ldap succeeded ok 12 - received hallo ok 13 - tcp connect ok 14 - ssl upgrade of connection to example.com/www failed ok 15 - tcp connect ok 16 - ssl upgrade of connection to server.local/ldap succeeded ok 17 - received hallo ok 18 - tcp connect ok 19 - ssl upgrade of connection to server.local/www failed ok 20 - tcp connect ok 21 - ssl upgrade of connection to bla.server.local/www succeeded ok 22 - received hallo ok 23 - tcp connect ok 24 - ssl upgrade of connection to www7.other.local/www succeeded ok 25 - received hallo ok 26 - tcp connect ok 27 - ssl upgrade of connection to www7.other.local/ldap failed ok 28 - tcp connect ok 29 - ssl upgrade of connection to bla.server.local/ldap succeeded ok 30 - received hallo ok t/cert_formats.t .................. 1..6 ok 1 - [PEM] ssl connect success ok 2 - [PEM_one_file] ssl connect success ok 3 - [PEM_keyenc] ssl connect success ok 4 - [DER] ssl connect success ok 5 - [PKCS12] ssl connect success ok 6 - [PKCS12_enc] ssl connect success ok t/cert_no_file.t .................. 1..9 ok - Server Initialization Using SSL_cert_file ok - Server accepted Using SSL_cert_file ok - client connected Using SSL_cert_file ok - Server Initialization Using SSL_cert ok - Server accepted Using SSL_cert ok - client connected Using SSL_cert ok - Server Initialization Empty SSL_cert ok - Empty SSL_cert: accept succeeded ok - Empty SSL_cert: connect succeeded ok t/compatibility.t ................. 1..9 ok - server create ok - socketToSSL ok - ssl upgrade ok - class MyClass ok - issuer_name ok - subject_name ok - opened ok - socket_to_SSL ok - upgrade is MyClass ok t/connectSSL-timeout.t ............ 1..16 ok # listening @127.0.0.1:64691 # server >> OK Waiting << ok # [server] OK ok # [server] Waiting # client >> OK << ok # [client] OK # server >> Connect from 127.0.0.1:64692 << ok # [server] Connect from # client >> Connected << ok # [client] Connected # server >> Server SSL Handshake OK << ok # [server] Server SSL Handshake OK # client >> Client SSL Handshake OK Hi! << ok # [client] Client SSL Handshake OK ok # [client] Hi! ok # listening @127.0.0.1:64693 # server >> OK Waiting << ok # [server] OK ok # [server] Waiting # client >> OK << ok # [client] OK # server >> Connect from 127.0.0.1:64694 << ok # [server] Connect from # client >> Connected << ok # [client] Connected # client >> Client SSL Handshake FAILED - SSL wants a read first << ok # [client] Client SSL Handshake FAILED ok t/core.t .......................... 1..48 ok - Server Initialization ok - Server Fileno Check ok - Server non-SSL Client Check ok - Server Kill-client Check ok - Client non-SSL connection ok - Client Verify-sub Check ok - Client Verify-sub Check ok - Server Client Accept Check ok - Client Initialization ok - Client Fileno Check ok - Accept returning peer address check. ok - Server Client Fileno Check ok - Client Peer Certificate Check ok - Client Peer Certificate Issuer Check ok - Client Cipher Check ok - Server Peek Check ok - Server Pending Check ok - Server Sysread Check ok - Client Peek Check ok - Server Getline Check ok - Server Getc Check ok - Server Getlines Check 1 ok - Server Getlines Check 2 ok - Server Getlines Check 3 ok - Server Getlines Check 4 ok - Server Getlines Check 5 ok - Client Sysread Check ok - Client Getline Check ok - Client Getc Check ok - Client Getlines Check 1 ok - Client Getlines Check 2 ok - Client Getlines Check 3 ok - Client Getlines Check 4 ok - Client Getlines Check 5 ok - Client Finished Reading Check ok - Second Client Initialization ok - Client Verify-sub Check ok - Client Verify-sub Check ok - Client Init from Fileno Check ok - Peer address check ok - Server Nonblocking Check 1 ok - Server Client Opened Check 1 ok - Client (fileno) Readline Check ok - Server Client Opened Check 2 ok - Server Nonblocking Check 2 ok - Client Nonblocking Check 1 ok - Server Nonblocking Check 3 ok - Client Nonblocking Check 2 ok t/dhe.t ........................... 1..3 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok t/ecdhe.t ......................... 1..4 ok # [server] Server Initialization ok # [server] Server accepted ok # [client] client connected ok # [client] ecdh key exchange: ECDHE-RSA-AES128-GCM-SHA256 ok # tcp connect to www.live.com:443 ok # tcp connect to www.google.com:443 ok # tcp connect to revoked.grc.com:443 ok t/external/ocsp.t ................. 1..3 ok 1 # skip fingerprints do not match ok 2 # skip fingerprints do not match ok 3 # skip fingerprints do not match ok # found 152 CA certs # have root CA for www.google.com in store # 5 connections to www.google.com ok # have root CA for www.twitter.com in store # 5 connections to www.twitter.com ok # have root CA for www.facebook.com in store # 5 connections to www.facebook.com ok # have root CA for www.live.com in store # 5 connections to www.live.com ok t/external/usable_ca.t ............ 1..21 ok 1 # skip fingerprint mismatch - probably SSL interception ok 2 # skip fingerprint mismatch - probably SSL interception ok 3 # skip fingerprint mismatch - probably SSL interception ok 4 # skip no root CA 415660c1 for www.yahoo.com in store ok 5 # skip no root CA 415660c1 for www.yahoo.com in store ok 6 # skip no root CA 415660c1 for www.yahoo.com in store ok 7 # skip no root CA 415660c1 for www.comdirect.de in store ok 8 # skip no root CA 415660c1 for www.comdirect.de in store ok 9 # skip no root CA 415660c1 for www.comdirect.de in store ok 10 # skip no root CA 415660c1 for meine.deutsche-bank.de in store ok 11 # skip no root CA 415660c1 for meine.deutsche-bank.de in store ok 12 # skip no root CA 415660c1 for meine.deutsche-bank.de in store ok 13 # skip fingerprint mismatch - probably SSL interception ok 14 # skip fingerprint mismatch - probably SSL interception ok 15 # skip fingerprint mismatch - probably SSL interception ok 16 # skip fingerprint mismatch - probably SSL interception ok 17 # skip fingerprint mismatch - probably SSL interception ok 18 # skip fingerprint mismatch - probably SSL interception ok 19 # skip fingerprint mismatch - probably SSL interception ok 20 # skip fingerprint mismatch - probably SSL interception ok 21 # skip fingerprint mismatch - probably SSL interception ok t/io-socket-inet6.t ............... 1..3 # IO::Socket::INET6 version=2.72 ok # [server] Server Initialization at ::1 # server at [::1]:64736 ok # [server] Server accepted ok # [client] client connected ok t/io-socket-ip.t .................. 1..3 # IO::Socket::IP version=0.37 ok # [server] Server Initialization at ::1 # server at [::1]:64739 ok # [server] Server accepted ok # [client] client connected ok t/memleak_bad_handshake.t ......... 1..1 ok # check memleak failed handshake (2442816,2442816,2442816) ok t/mitm.t .......................... 1..8 ok # server ssl socket ok # proxy tcp socket ok # ssl connected to server ok # subject w/o mitm ok # issuer w/o mitm ok # ssl connected to proxy ok # subject w/ mitm ok # issuer w/ mitm ok t/nonblock.t ...................... 1..27 ok # [server] Server Initialization # connect in progress # claims that socket is already connected ok # [client] client tcp connect # wrote 9 bytes ok # [client] write plain text ok # [server] tcp accept ok # [server] received plain text ok # [server] upgrade to_client to IO::Socket::SSL ok # [client] upgrade client to IO::Socket::SSL # SSL wants a read first # SSL wants a read first ok # [server] ssl accept handshake done ok # [client] connected ok # [client] nonblocking connect with 2 attempts # sndbuf=8192 ok # [server] received client message # $!=Resource temporarily unavailable $SSL_ERROR=SSL wants a write first send=23040 # wait for write # read 30000 (1 r/w attempts) # $!=Broken pipe $SSL_ERROR=SSL write error (5) send=33580 # connection closed ok # [client] syswrite ok # [client] multiple write attempts ok # [client] 30000 bytes send # connect in progress # claims that socket is already connected ok # [client] client tcp connect # wrote 9 bytes ok # [client] write plain text ok # [server] tcp accept ok # [server] received plain text ok # [server] upgrade to_client to IO::Socket::SSL ok # [client] upgrade client to IO::Socket::SSL # SSL wants a read first ok # [server] ssl accept handshake done ok # [server] nonblocking accept_SSL with 2 attempts # SSL wants a read first ok # [client] connected # sndbuf=8192 ok # [server] received client message # $!=Resource temporarily unavailable $SSL_ERROR=SSL wants a write first send=23040 # wait for write # read 30000 (2 r/w attempts) # $!=Broken pipe $SSL_ERROR=SSL write error (5) send=32460 # connection closed ok # [client] syswrite ok # [client] multiple write attempts ok # [client] 30000 bytes send ok t/npn.t ........................... 1..5 ok # [server] Server Initialization at 127.0.0.1 # server at 127.0.0.1:65054 ok # [server] Server accepted ok # [server] negotiated two ok # [client] client connected ok # [client] negotiated two ok # -- test: newINET start_SSL stop_SSL start_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x160301 from client # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 connect_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 start_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # server accepted new client # wait for initial data from client # got 0x656e64 from client # client requested end of tests t/plain_upgrade_downgrade.t ....... 1..15 ok 1 - newINET ok 2 - start_SSL ok 3 - stop_SSL ok 4 - start_SSL ok 5 - newSSL ok 6 - stop_SSL ok 7 - connect_SSL ok 8 - newSSL:0 ok 9 - connect_SSL ok 10 - stop_SSL ok 11 - connect_SSL ok 12 - newSSL:0 ok 13 - start_SSL ok 14 - stop_SSL ok 15 - connect_SSL ok # looks like OpenSSL was compiled without SSLv3 support t/protocol_version.t .............. ok 1 - accept SSLv23 with any, got TLSv1_2 ok 2 - accept TLSv1 with TLSv1 ok 3 - accept SSLv23:!TLSv1_2:!TLSv1_1 with TLSv1 ok 4 - accept TLSv1_1 with TLSv1_1 ok 5 - accept SSLv23:!TLSv1_2 with TLSv1_1 ok 6 - accept TLSv1_2 with TLSv1_2 ok 7 - accept SSLv23 with TLSv1_2 1..7 ok t/public_suffix_lib_encode_idn.t .. 1..79 ok 1 - create two-level ok 2 - com -> + com ok 3 - bar.com -> + bar.com ok 4 - www.bar.com -> www + bar.com ok 5 - www.foo.bar.com -> www.foo + bar.com ok 6 - uk -> + uk ok 7 - co.uk -> + co.uk ok 8 - www.co.uk -> + www.co.uk ok 9 - www.bar.co.uk -> www + bar.co.uk ok 10 - www.foo.bar.co.uk -> www.foo + bar.co.uk ok 11 - bl.uk -> + bl.uk ok 12 - www.bl.uk -> www + bl.uk ok 13 - www.bar.bl.uk -> www.bar + bl.uk ok 14 - www.foo.bar.bl.uk -> www.foo.bar + bl.uk ok 15 ok 16 ok 17 ok 18 ok 19 ok 20 ok 21 ok 22 ok 23 ok 24 ok 25 ok 26 ok 27 ok 28 ok 29 ok 30 ok 31 ok 32 ok 33 ok 34 ok 35 ok 36 ok 37 ok 38 ok 39 ok 40 ok 41 ok 42 ok 43 ok 44 ok 45 ok 46 ok 47 ok 48 ok 49 ok 50 ok 51 ok 52 ok 53 ok 54 ok 55 ok 56 ok 57 ok 58 ok 59 ok 60 ok 61 ok 62 ok 63 ok 64 ok 65 ok 66 ok 67 ok 68 ok 69 ok 70 ok 71 ok 72 ok 73 ok 74 ok 75 ok 76 ok 77 ok 78 ok 79 ok t/public_suffix_lib_libidn.t ...... 1..79 ok 1 - create two-level ok 2 - com -> + com ok 3 - bar.com -> + bar.com ok 4 - www.bar.com -> www + bar.com ok 5 - www.foo.bar.com -> www.foo + bar.com ok 6 - uk -> + uk ok 7 - co.uk -> + co.uk ok 8 - www.co.uk -> + www.co.uk ok 9 - www.bar.co.uk -> www + bar.co.uk ok 10 - www.foo.bar.co.uk -> www.foo + bar.co.uk ok 11 - bl.uk -> + bl.uk ok 12 - www.bl.uk -> www + bl.uk ok 13 - www.bar.bl.uk -> www.bar + bl.uk ok 14 - www.foo.bar.bl.uk -> www.foo.bar + bl.uk ok 15 ok 16 ok 17 ok 18 ok 19 ok 20 ok 21 ok 22 ok 23 ok 24 ok 25 ok 26 ok 27 ok 28 ok 29 ok 30 ok 31 ok 32 ok 33 ok 34 ok 35 ok 36 ok 37 ok 38 ok 39 ok 40 ok 41 ok 42 ok 43 ok 44 ok 45 ok 46 ok 47 ok 48 ok 49 ok 50 ok 51 ok 52 ok 53 ok 54 ok 55 ok 56 ok 57 ok 58 ok 59 ok 60 ok 61 ok 62 ok 63 ok 64 ok 65 ok 66 ok 67 ok 68 ok 69 ok 70 ok 71 ok 72 ok 73 ok 74 ok 75 ok 76 ok 77 ok 78 # skip no IDN support with Net::LibIDN ok 79 # skip no IDN support with Net::LibIDN ok t/public_suffix_lib_uri.t ......... 1..79 ok 1 - create two-level ok 2 - com -> + com ok 3 - bar.com -> + bar.com ok 4 - www.bar.com -> www + bar.com ok 5 - www.foo.bar.com -> www.foo + bar.com ok 6 - uk -> + uk ok 7 - co.uk -> + co.uk ok 8 - www.co.uk -> + www.co.uk ok 9 - www.bar.co.uk -> www + bar.co.uk ok 10 - www.foo.bar.co.uk -> www.foo + bar.co.uk ok 11 - bl.uk -> + bl.uk ok 12 - www.bl.uk -> www + bl.uk ok 13 - www.bar.bl.uk -> www.bar + bl.uk ok 14 - www.foo.bar.bl.uk -> www.foo.bar + bl.uk ok 15 ok 16 ok 17 ok 18 ok 19 ok 20 ok 21 ok 22 ok 23 ok 24 ok 25 ok 26 ok 27 ok 28 ok 29 ok 30 ok 31 ok 32 ok 33 ok 34 ok 35 ok 36 ok 37 ok 38 ok 39 ok 40 ok 41 ok 42 ok 43 ok 44 ok 45 ok 46 ok 47 ok 48 ok 49 ok 50 ok 51 ok 52 ok 53 ok 54 ok 55 ok 56 ok 57 ok 58 ok 59 ok 60 ok 61 ok 62 ok 63 ok 64 ok 65 ok 66 ok 67 ok 68 ok 69 ok 70 ok 71 ok 72 ok 73 ok 74 ok 75 ok 76 ok 77 ok 78 ok 79 ok t/public_suffix_ssl.t ............. 1..26 ok 1 - ssl com against * -> fail (hostname verification failed) ok 2 - ssl com against com -> ok ok 3 - ssl googleapis.com against *.com -> fail (hostname verification failed) ok 4 - ssl googleapis.com against googleapis.com -> ok ok 5 - ssl ajax.googleapis.com against *.googleapis.com -> ok ok 6 - ssl s3.amazonaws.com against s3.amazonaws.com -> ok ok 7 - ssl foo.s3.amazonaws.com against *.s3.amazonaws.com -> ok ok 8 - ssl google.com against *.com -> fail (hostname verification failed) ok 9 - ssl google.com against google.com -> ok ok 10 - ssl www.google.com against *.google.com -> ok ok 11 - ssl www.bar.com against *.bar.com -> ok ok 12 - ssl www.foo.bar.com against *.foo.bar.com -> ok ok 13 - ssl www.foo.co.uk against *.foo.co.uk -> ok ok 14 - ssl www.co.uk against *.co.uk -> fail (hostname verification failed) ok 15 - ssl co.uk against *.uk -> fail (hostname verification failed) ok 16 - ssl bl.uk against bl.uk -> ok ok 17 - ssl www.bl.uk against *.bl.uk -> ok ok 18 - ssl bar.kobe.jp against *.kobe.jp -> fail (hostname verification failed) ok 19 - ssl foo.bar.kobe.jp against *.bar.kobe.jp -> fail (hostname verification failed) ok 20 - ssl www.foo.bar.kobe.jp against *.foo.bar.kobe.jp -> ok ok 21 - ssl city.kobe.jp against *.kobe.jp -> fail (hostname verification failed) ok 22 - ssl city.kobe.jp against city.kobe.jp -> ok ok 23 - ssl www.city.kobe.jp against *.city.kobe.jp -> ok ok 24 - ssl nodomain against * -> fail (hostname verification failed) ok 25 - ssl foo.nodomain against *.nodomain -> fail (hostname verification failed) ok 26 - ssl www.foo.nodomain against *.foo.nodomain -> ok ok t/readline.t ...................... 1..19 ok # [server] Server Initialization ok # [client] client connected ok # [server] Server accepted ok # [client] Test00 ok # [server] Server accepted ok # [client] client connected ok # [client] Test01 ok # [server] Server accepted ok # [client] client connected ok # [client] Test02 ok # [server] Server accepted ok # [client] client connected ok # [client] Test03 ok # [server] Server accepted ok # [client] client connected ok # [client] Test04 ok # [server] Server accepted ok # [client] client connected ok # [client] Test05 ok t/sessions.t ...................... 1..35 ok #Server initialization ok #Context init ok #Superficial Cache Addition Test ok #Superficial Cache Addition Test 2 ok #Cache Keys Check 1 ok #Cache Keys Check 2 ok #Cache Head Check ok #Cache Link Check ok #Client init ok #Client init ok #Cache Keys Check 3 ok #Cache Removal Test ok #Cache Tail Check ok #Cache Insertion Test ok #Cache Entry Test 0 ok #Cache Entry Test 1 ok #Cache Entry Test 2 ok #Cache Keys Check 4 ok #Cache Keys Check 5 ok #Second Cache Entry Test 0 ok #Client init 2 ok #Write Test 0 ok #Server Read 0 ok #Read Test 0 ok #Second Cache Entry Test 1 ok #Write Test 1 ok #Server Write 0 ok #Server Read 1 ok #Read Test 1 ok #Second Cache Entry Test 2 ok #Server Write 1 ok #Write Test 2 ok #Server Read 2 ok #Server Write 2 ok #Read Test 2 ok t/signal-readline.t ............... 1..9 ok #Server Initialization ok #client ssl connect ok #got hup ok #got line ok #accept ok #wrote foo ok #send hup ok #wrote bar\n ok #wait: 0 ok t/sni.t ........................... 1..17 ok # Server Initialization ok # client ssl connect server.local ok # client verify hostname in cert server.local ok # client ssl connect client.local ok # client verify hostname in cert client.local ok # client ssl connect smtp.mydomain.local ok # client verify hostname in cert smtp.mydomain.local ok # client ssl connect www13.other.local ok # client verify hostname in cert www13.other.local ok # server accept ok # server got SNI name server.local ok # server accept ok # server got SNI name client.local ok # server accept ok # server got SNI name smtp.mydomain.local ok # server accept ok # server got SNI name www13.other.local ok t/sni_verify.t .................... 1..17 ok # Server Initialization ok # client ssl connect server.local ok # client verify hostname in cert server.local ok # client ssl connect client.local ok # client verify hostname in cert client.local ok # client ssl connect smtp.mydomain.local ok # client verify hostname in cert smtp.mydomain.local ok # client ssl connect www13.other.local ok # client verify hostname in cert www13.other.local ok # server accept ok # server got SNI name server.local ok # server accept ok # server got SNI name client.local ok # server accept ok # server got SNI name smtp.mydomain.local ok # server accept ok # server got SNI name www13.other.local ok t/start-stopssl.t ................. 1..16 ok #listen ok #client connect ok # server::class=IO::Socket::SSL ok # client::start_SSL ok # client::class=IO::Socket::SSL ok #server::stop_SSL ok # class=IO::Socket::INET ok # client::stop_SSL ok # client::class=IO::Socket::INET ok # server::class=IO::Socket::SSL ok # client::start_SSL ok # client::class=IO::Socket::SSL ok #server::close ok # class=IO::Socket::SSL ok # client::close ok # client::class=IO::Socket::SSL ok t/startssl-failed.t ............... 1..9 ok #Server Initialization ok #client tcp connect ok #tcp accept ok #send non-ssl data ok #startssl client failed: SSL connect attempt failed error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol ok #downgrade socket after error ok #send to server ok #received non-ssl data ok #client receive non-ssl data ok t/startssl.t ...................... 1..21 ok #Server Initialization ok #Server Fileno Check ok #client tcp connect ok #tcp accept ok #sslify server ok #server reblessed as IO::Socket::SSL ok #server local certificate subject ok #server local certificate issuer ok #sslify client ok #client reblessed as IO::Socket::SSL ok #server local certificate fingerprint ok #server peer certificate subject ok #server peer certificate issuer ok #client local certificate subject ok #client local certificate issuer ok #client local certificate fingerprint ok #client peer certificate subject ok #client peer certificate issuer ok #client peer certificate fingerprint ok #server peer certificate fingerprint ok #received client message ok t/sysread_write.t ................. 1..9 ok # [server] Server Initialization ok # [client] client connected ok # [server] Server accepted ok # [server] partial read in sysread ok # [client] received ack ok # [client] send in time ok # [client] partial write in syswrite ok # [client] full write in write (18000) ok # [server] send ack back ok t/verify_fingerprint.t ............ 1..12 ok 1 - accept fp1 for saddr1 ok 2 - accept fp2 for saddr2 ok 3 - reject ifp2 for saddr2 ok 4 - reject fp2 for saddr1 ok 5 - reject fp1 for saddr2 ok 6 - accept fp1|fp2 for saddr1 ok 7 - accept fp1|fp2 for saddr2 ok 8 - accept fp2 for saddr2 even if ca1 given ok 9 - accept ca2 for saddr2 ok 10 - reject ca2 for saddr1 ok 11 - accept ca[12] for saddr1 ok 12 - reject non-ca cert1 as ca for saddr1 ok t/verify_hostname.t ............... 1..45 ok #Server Initialization ok #client ssl connect ok #issuer ok #cn ok #*.server.local ok #127.0.0.1 ok #www*.other.local ok #smtp.mydomain.local ok #xn--lwe-sna.idntest.local ok #no more altSubjectNames ok #pass 127.0.0.1 smtp ok #pass 127.0.0.1 ldap ok #pass 127.0.0.1 www ok #pass server.local smtp ok #pass server.local ldap ok #fail server.local www ok #pass blafasel.server.local smtp ok #pass blafasel.server.local ldap ok #pass blafasel.server.local www ok #fail lala.blafasel.server.local smtp ok #fail lala.blafasel.server.local ldap ok #fail lala.blafasel.server.local www ok #fail www.other.local smtp ok #fail www.other.local ldap ok #fail www.other.local www ok #fail www-13.other.local smtp ok #fail www-13.other.local ldap ok #pass www-13.other.local www ok #fail www-13.lala.other.local smtp ok #fail www-13.lala.other.local ldap ok #fail www-13.lala.other.local www ok #pass smtp.mydomain.local smtp ok #pass smtp.mydomain.local ldap ok #pass smtp.mydomain.local www ok #pass xn--lwe-sna.idntest.local smtp ok #pass xn--lwe-sna.idntest.local ldap ok #pass xn--lwe-sna.idntest.local www ok #fail smtp.mydomain.localizing.useless.local smtp ok #fail smtp.mydomain.localizing.useless.local ldap ok #fail smtp.mydomain.localizing.useless.local www ok #pass löwe.idntest.local smtp ok #pass löwe.idntest.local ldap ok #pass löwe.idntest.local www ok #implicit hostname check www.server.local ok #implicit hostname check does.not.match.server.local ok t/verify_hostname_standalone.t .... 1..78 ok 1 - 1|foo.com: cn=foo.com san= ok 2 - 1|f: cn=f san= ok 3 - 0|h: cn=i san= ok 4 - 1|bar.foo.com: cn=*.foo.com san= ok 5 - 1|www.test.fr: cn=common.name san=DNS:*.test.com,DNS:*.test.co.uk,DNS:*.test.de,DNS:*.test.fr ok 6 - 1|wwW.tESt.fr: cn=common.name san=DNS:*.*,DNS:*.test.de,DNS:*.test.FR,DNS:www ok 7 - 0|f.uk: cn=.uk san= ok 8 - 0|w.bar.foo.com: cn=?.bar.foo.com san= ok 9 - 0|www.foo.com: cn=(www|ftp).foo.com san= ok 10 - 0|www.foo.com: cn=www.foo.com\x00 san= ok 11 - 0|www.house.example: cn=ww.house.example san= ok 12 - 0|test.org: cn= san=DNS:www.test.org,DNS:*.test.org,DNS:*.org ok 13 - 0|w.bar.foo.com: cn=w*.bar.foo.com san= ok 14 - 0|www.bar.foo.com: cn=ww*ww.bar.foo.com san= ok 15 - 0|wwww.bar.foo.com: cn=ww*ww.bar.foo.com san= ok 16 - 1|wwww.bar.foo.com: cn=w*w.bar.foo.com san= ok 17 - 0|wwww.bar.foo.com: cn=w*w.bar.foo.c0m san= ok 18 - 1|WALLY.bar.foo.com: cn=wa*.bar.foo.com san= ok 19 - 1|wally.bar.foo.com: cn=*Ly.bar.foo.com san= ok 20 - 0|www.test.co.jp: cn=www.test.co.jp san=DNS:*.test.de,DNS:*.jp,DNS:www.test.co.uk,DNS:www.*.co.jp ok 21 - 0|www.bar.foo.com: cn=www.bar.foo.com san=DNS:*.foo.com,DNS:*.*.foo.com,DNS:*.*.bar.foo.com,DNS:*..bar.foo.com ok 22 - 1|www.bath.org: cn=www.bath.org san=IP:20.30.40.50 ok 23 - 0|66.77.88.99: cn=www.bath.org san=DNS:www.bath.org ok 24 - 1|xn--poema-9qae5a.com.br: cn=xn--poema-9qae5a.com.br san= ok 25 - 1|www.xn--poema-9qae5a.com.br: cn=*.xn--poema-9qae5a.com.br san= ok 26 - 0|xn--poema-9qae5a.com.br: cn= san=DNS:*.xn--poema-9qae5a.com.br,DNS:xn--poema-*.com.br,DNS:xn--*-9qae5a.com.br,DNS:*--poema-9qae5a.com.br ok 27 - 1|xn--poema-9qae5a.foo.com.br: cn=*.foo.com.br san= ok 28 - 1|foo.example.com: cn=*.example.com san= ok 29 - 0|bar.foo.example.com: cn=*.example.com san= ok 30 - 0|example.com: cn=*.example.com san= ok 31 - 1|baz1.example.net: cn=baz*.example.net san= ok 32 - 1|foobaz.example.net: cn=*baz.example.net san= ok 33 - 1|buzz.example.net: cn=b*z.example.net san= ok 34 - 1|h.foo.com: cn=*.foo.com san= ok 35 - 0|foo.com: cn=*.com san= ok 36 - 0|foo.us: cn=*.us san= ok 37 - 0|foo: cn=* san= ok 38 - 0|foo.example.com: cn=*.*.com san= ok 39 - 0|foo.bar.example.com: cn=*.bar.*.com san= ok 40 - 1|foo.com: cn=foo.com. san= ok 41 - 1|foo.com.: cn=foo.com san= ok 42 - 1|foo.com.: cn=foo.com. san= ok 43 - 1|f: cn=f. san= ok 44 - 1|f.: cn=f san= ok 45 - 1|f.: cn=f. san= ok 46 - 1|www-3.bar.foo.com: cn=*.bar.foo.com. san= ok 47 - 1|www-3.bar.foo.com.: cn=*.bar.foo.com san= ok 48 - 1|www-3.bar.foo.com.: cn=*.bar.foo.com. san= ok 49 - 0|.: cn=. san= ok 50 - 0|example.com: cn=*.com. san= ok 51 - 0|example.com.: cn=*.com san= ok 52 - 0|example.com.: cn=*.com. san= ok 53 - 0|foo.: cn=*. san= ok 54 - 1|127.0.0.1: cn=127.0.0.1 san= ok 55 - 1|192.168.1.1: cn=192.168.1.1 san= ok 56 - 0|192.169.1.1: cn=192.168.1.1 san= ok 57 - 0|12.19.1.1: cn=12.19.1.1/255.255.255.0 san= ok 58 - 0|FEDC:ba98:7654:3210:FEDC:BA98:7654:3210: cn=FEDC:BA98:7654:3210:FEDC:ba98:7654:3210 san= ok 59 - 0|1111:2222:3333:4444:5555:6666:7777:8888: cn=1111:2222:3333:4444:5555:6666:7777:8888 san= ok 60 - 0|::192.9.5.5: cn=[::192.9.5.5] san= ok 61 - 0|::192.9.5.5: cn=*.9.5.5 san= ok 62 - 0|2010:836B:4179::836B:4179: cn=*:836B:4179::836B:4179 san= ok 63 - 0|192.168.1.11: cn=*.168.1.11 san= ok 64 - 0|FEDC:BA98:7654:3210:FEDC:BA98:7654:3210: cn=*.] san= ok 65 - 1|10.1.2.3: cn= san=IP:10.1.2.3 ok 66 - 1|10.1.2.7: cn=10.1.2.7 san=IP:10.1.2.6,IP:10.1.2.8 ok 67 - 0|10.1.2.8: cn=10.20.2.8 san=DNS:foo ok 68 - 1|::4.5.6.7: cn= san=IP:0000:0000:0000:0000:0000:0000:0405:0607 ok 69 - 0|::6.7.8.9: cn=::6.7.8.9 san=DNS:::6.7.8.9,IP:0000:0000:0000:0000:0000:0000:0607:0808,IP:0000:0000:0000:0000:0000:0000:0607:080a,IP:ff00:0000:0000:0000:0000:0000:0607:0809,IP:6.7.8.9 ok 70 - 1|FE80::200:f8ff:fe21:67cf: cn=no.common.name san=IP:0000:0000:0000:0000:0000:0000:0607:0808,IP:fe80:0000:0000:0000:0200:f8ff:fe21:67cf,IP:ff00:0000:0000:0000:0000:0000:0607:08ff,IP:10.0.0.1 ok 71 - 0|12345.6: cn=12345.6 san= ok 72 - 0|121.2.3.512: cn= san=DNS:1*1.2.3.512,DNS:*1.2.3.512,DNS:1*.2.3.512,DNS:*.2.3.512,IP:121.2.3.0 ok 73 - 0|1.2.3.4.5.6: cn=*.2.3.4.5.6 san= ok 74 - 0|www.*.com: cn=www.*.com san= ok 75 - 0|w$w.f.com: cn=w$w.f.com san= ok 76 - 0|nocolonallowed:example: cn= san=DNS:nocolonallowed:example ok 77 - 0|www-1.[::FFFF:129.144.52.38]: cn=*.[::FFFF:129.144.52.38] san= ok 78 - 0|[::4.5.6.9]: cn= san=IP:0000:0000:0000:0000:0000:0000:0405:0609 ok All tests successful. Files=37, Tests=791, 49 wallclock secs ( 0.25 usr 0.11 sys + 8.92 cusr 1.44 csys = 10.72 CPU) Result: PASS SULLR/IO-Socket-SSL-2.032.tar.gz make test TEST_VERBOSE=1 -- OK Steffen Ullrich <Steffen_Ullrich@genua.de> Nearly transparent SSL encapsulation for IO::Socket::INET. >>> (cd /Users/fly2000/cpanfly-5.20/var/tmp/cpan_build/IO-Socket-SSL-2.032-NhKcMo && tar cvf - IO-Socket-SSL-2.032.ppd blib) | gzip -c >/Users/fly2000/cpanfly-5.20/var/REPO/S/SU/SULLR/IO-Socket-SSL-2.032.tar.gz IO-Socket-SSL-2.032.ppd blib/ blib/lib/ blib/lib/IO/ blib/lib/IO/Socket/ blib/lib/IO/Socket/SSL/ blib/lib/IO/Socket/SSL/Intercept.pm blib/lib/IO/Socket/SSL/PublicSuffix.pm blib/lib/IO/Socket/SSL/Utils.pm blib/lib/IO/Socket/SSL.pm blib/lib/IO/Socket/SSL.pod blib/man3/ blib/man3/IO::Socket::SSL.3 blib/man3/IO::Socket::SSL::Intercept.3 blib/man3/IO::Socket::SSL::PublicSuffix.3 blib/man3/IO::Socket::SSL::Utils.3 Finished 2016-07-13T10:08:11