START	security/p5-IO-Socket-SSL	2024-06-25T13:18:39Z

===> p5-IO-Socket-SSL-2.085 depends on: p5-IO-Socket-INET6->=2.62 -> p5-IO-Socket-INET6-2.73
===> p5-IO-Socket-SSL-2.085 depends on: p5-Net-IDN-Encode-* -> p5-Net-IDN-Encode-2.500p2
===> p5-IO-Socket-SSL-2.085 depends on: p5-URI->=1.50 -> p5-URI-5.28
===> p5-IO-Socket-SSL-2.085 depends on: p5-Net-SSLeay->=1.88 -> p5-Net-SSLeay-1.94p0
===>  Regression tests for p5-IO-Socket-SSL-2.085
PERL_DL_NONLAZY=1 "/usr/bin/perl" "-MExtUtils::Command::MM" "-MTest::Harness" "-e" "undef *Test::Harness::Switches; test_harness(0, 'blib/lib', 'blib/arch')" t/*.t t/external/*.t
# openssl version compiled=0x20000000 linked=0x20000000 -- LibreSSL 3.9.0
# Net::SSLeay version=1.94
# parent IO::Socket::IP version=0.4101
t/01loadmodule.t .................. ok
t/acceptSSL-timeout.t ............. ok
t/alpn.t .......................... ok
t/auto_verify_hostname.t .......... ok
t/cert_formats.t .................. ok
t/cert_no_file.t .................. ok
t/compatibility.t ................. ok
t/connectSSL-timeout.t ............ ok
t/core.t .......................... ok
t/dhe.t ........................... ok
t/ecdhe.t ......................... ok
t/external/ocsp.t ................. ok
# found 138 CA certs
# have root CA for www.bild.de in store
# have root CA for www.yahoo.com in store
# have root CA for www.comdirect.de in store
# have root CA for meine.deutsche-bank.de in store
# have root CA for www.twitter.com in store
# have root CA for www.facebook.com in store
# have root CA for www.live.com in store
t/external/usable_ca.t ............ ok
t/io-socket-inet6.t ............... ok
t/io-socket-ip.t .................. ok
t/memleak_bad_handshake.t ......... ok
t/mitm.t .......................... ok
t/multiple-cert-rsa-ecc.t ......... ok
t/nonblock.t ...................... ok
t/npn.t ........................... skipped: NPN not available in Net::SSLeay
# -- test: newINET start_SSL stop_SSL start_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x160303 from client
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL:0 connect_SSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL:0 start_SSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# server accepted new client
# wait for initial data from client
# got 0x656e64 from client
# client requested end of tests
t/plain_upgrade_downgrade.t ....... ok
# looks like OpenSSL was compiled without SSLv3 support
# looks like OpenSSL was compiled without TLSv1 support
# looks like OpenSSL was compiled without TLSv1_1 support
t/protocol_version.t .............. ok
t/public_suffix_lib_encode_idn.t .. ok
t/public_suffix_lib_libidn.t ...... ok
t/public_suffix_lib_uri.t ......... ok
t/public_suffix_ssl.t ............. ok
t/readline.t ...................... ok
t/session_cache.t ................. ok
# listen at 127.0.0.1:19194
# listen at 127.0.0.1:4749
# connect to 0: success reuse=0 version=TLSv1_2
# connect to 0: success reuse=1 version=TLSv1_2
# connect to 1: success reuse=1 version=TLSv1_2
# connect to 1: success reuse=0 version=TLSv1_2
# connect to 0: success reuse=0 version=TLSv1_2
# connect to 0: success reuse=1 version=TLSv1_2
t/session_ticket.t ................ ok
t/sessions.t ...................... ok
t/set_curves.t .................... ok
t/signal-readline.t ............... ok
t/sni.t ........................... ok
t/sni_verify.t .................... ok
t/start-stopssl.t ................. ok
t/startssl-failed.t ............... ok
t/startssl.t ...................... ok
t/sysread_write.t ................. ok
t/verify_fingerprint.t ............ ok
t/verify_hostname.t ............... ok
failure during X509V3_EXT_conf_nid() for nid=85
148352540904:error:22FFF077:X509 V3 routines:CRYPTO_internal:bad object:/usr/src/lib/libcrypto/x509/x509_alt.c:689:name=DNS value='::6.7.8.9'
failure during X509V3_EXT_conf_nid() for nid=85
148352540904:error:22FFF077:X509 V3 routines:CRYPTO_internal:bad object:/usr/src/lib/libcrypto/x509/x509_alt.c:689:name=DNS value='nocolonallowed:example'
t/verify_hostname_standalone.t .... ok
t/verify_partial_chain.t .......... ok
All tests successful.
Files=42, Tests=803, 71 wallclock secs ( 0.39 usr  0.40 sys + 25.37 cusr  7.34 csys = 33.50 CPU)
Result: PASS

PASS	security/p5-IO-Socket-SSL	Duration 1m16.49s