START security/p5-IO-Socket-SSL 2024-11-16T13:36:54Z ===> p5-IO-Socket-SSL-2.089 depends on: p5-IO-Socket-INET6->=2.62 -> p5-IO-Socket-INET6-2.73 ===> p5-IO-Socket-SSL-2.089 depends on: p5-Net-IDN-Encode-* -> p5-Net-IDN-Encode-2.500p2 ===> p5-IO-Socket-SSL-2.089 depends on: p5-URI->=1.50 -> p5-URI-5.31 ===> p5-IO-Socket-SSL-2.089 depends on: p5-Net-SSLeay->=1.88 -> p5-Net-SSLeay-1.94p0 ===> Regression tests for p5-IO-Socket-SSL-2.089 PERL_DL_NONLAZY=1 "/usr/bin/perl" "-MExtUtils::Command::MM" "-MTest::Harness" "-e" "undef *Test::Harness::Switches; test_harness(0, 'blib/lib', 'blib/arch')" t/*.t t/external/*.t # openssl version compiled=0x20000000 linked=0x20000000 -- LibreSSL 4.0.0 # Net::SSLeay version=1.94 # parent IO::Socket::IP version=0.4101 t/01loadmodule.t .................. ok t/acceptSSL-timeout.t ............. ok t/alpn.t .......................... ok t/auto_verify_hostname.t .......... ok t/cert_formats.t .................. ok t/cert_no_file.t .................. ok t/compatibility.t ................. ok t/connectSSL-timeout.t ............ ok t/core.t .......................... ok t/dhe.t ........................... ok t/ecdhe.t ......................... ok t/external/ocsp.t ................. ok # found 150 CA certs # have root CA for www.bild.de in store # have root CA for www.yahoo.com in store # have root CA for www.comdirect.de in store # have root CA for meine.deutsche-bank.de in store # have root CA for www.twitter.com in store # have root CA for www.facebook.com in store # have root CA for www.live.com in store t/external/usable_ca.t ............ ok t/io-socket-inet6.t ............... ok t/io-socket-ip.t .................. ok t/memleak_bad_handshake.t ......... ok t/mitm.t .......................... ok t/multiple-cert-rsa-ecc.t ......... ok t/nonblock.t ...................... ok t/npn.t ........................... skipped: NPN not available in Net::SSLeay # -- test: newINET start_SSL stop_SSL start_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x160303 from client # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 connect_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 start_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # server accepted new client # wait for initial data from client # got 0x656e64 from client # client requested end of tests t/plain_upgrade_downgrade.t ....... ok # looks like OpenSSL was compiled without SSLv3 support # looks like OpenSSL was compiled without TLSv1 support # looks like OpenSSL was compiled without TLSv1_1 support t/protocol_version.t .............. ok t/psk.t ........................... skipped: insufficient support for PSK in Net::SSLeay t/public_suffix_lib_encode_idn.t .. ok t/public_suffix_lib_libidn.t ...... ok t/public_suffix_lib_uri.t ......... ok t/public_suffix_ssl.t ............. ok t/readline.t ...................... ok t/session_cache.t ................. ok # listen at 127.0.0.1:5074 # listen at 127.0.0.1:13835 # connect to 0: success reuse=0 version=TLSv1_2 # connect to 0: success reuse=1 version=TLSv1_2 # connect to 1: success reuse=1 version=TLSv1_2 # connect to 1: success reuse=0 version=TLSv1_2 # connect to 0: success reuse=0 version=TLSv1_2 # connect to 0: success reuse=1 version=TLSv1_2 t/session_ticket.t ................ ok t/sessions.t ...................... ok t/set_curves.t .................... ok t/signal-readline.t ............... ok t/sni.t ........................... ok t/sni_verify.t .................... ok t/start-stopssl.t ................. ok t/startssl-failed.t ............... ok t/startssl.t ...................... ok t/sysread_write.t ................. ok t/verify_fingerprint.t ............ ok t/verify_hostname.t ............... ok failure during X509V3_EXT_conf_nid() for nid=85 86772087608:error:22FFF077:X509 V3 routines:CRYPTO_internal:bad object:/usr/src/lib/libcrypto/x509/x509_alt.c:707:name=DNS value='::6.7.8.9' failure during X509V3_EXT_conf_nid() for nid=85 86772087608:error:22FFF077:X509 V3 routines:CRYPTO_internal:bad object:/usr/src/lib/libcrypto/x509/x509_alt.c:707:name=DNS value='nocolonallowed:example' t/verify_hostname_standalone.t .... ok t/verify_partial_chain.t .......... ok All tests successful. Files=43, Tests=805, 71 wallclock secs ( 0.37 usr 0.49 sys + 25.21 cusr 7.34 csys = 33.41 CPU) Result: PASS PASS security/p5-IO-Socket-SSL Duration 1m17.15s