security/p5-IO-Socket-SSL
Perl5 interface to SSL sockets
Flavor |
Version |
Run |
OSVersion |
Arch |
License |
Restricted |
Status |
|
|
2.060 |
503 |
3.0 |
amd64 |
artistic gpl |
0 |
fail |
|
Events
Machine |
Type |
Time |
Message |
m3064b |
info |
2022-12-18 21:10:35.156566 |
Test Started |
m3064b |
fail |
2022-12-18 21:11:18.234093 |
make test returned non-zero: 1 |
m3064b |
fail |
2022-12-18 21:11:18.286535 |
Test complete. |
Log
[1m===> Testing for p5-IO-Socket-SSL-2.060[0m
PERL_DL_NONLAZY=1 "/usr/bin/perl" "-MExtUtils::Command::MM" "-MTest::Harness" "-e" "undef *Test::Harness::Switches; test_harness(0, 'blib/lib', 'blib/arch')" t/*.t
# openssl version compiled=0x1010111f linked=0x1010111f -- OpenSSL 1.1.1q-midnightbsd 5 Jul 2022
# Net::SSLeay version=1.92
# parent IO::Socket::IP version=0.41
t/01loadmodule.t .................. ok
t/acceptSSL-timeout.t ............. ok
t/alpn.t .......................... ok
t/auto_verify_hostname.t .......... ok
t/cert_formats.t .................. ok
t/cert_no_file.t .................. ok
t/compatibility.t ................. ok
t/connectSSL-timeout.t ............ ok
t/core.t .......................... ok
t/dhe.t ........................... ok
t/ecdhe.t ......................... ok
t/io-socket-inet6.t ............... ok
t/io-socket-ip.t .................. ok
t/memleak_bad_handshake.t ......... ok
t/mitm.t .......................... ok
t/nonblock.t ...................... ok
t/npn.t ........................... ok
# -- test: newINET start_SSL stop_SSL start_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x160301 from client
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL:0 connect_SSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL:0 start_SSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# server accepted new client
# wait for initial data from client
# got 0x656e64 from client
# client requested end of tests
t/plain_upgrade_downgrade.t ....... ok
t/protocol_version.t .............. ok
t/public_suffix_lib_encode_idn.t .. ok
t/public_suffix_lib_libidn.t ...... ok
t/public_suffix_lib_uri.t ......... ok
t/public_suffix_ssl.t ............. ok
t/readline.t ...................... ok
# listen at 127.0.0.1:27408
# listen at 127.0.0.1:27409
# connect to 0: success reuse=0
# connect to 0: success reuse=1
# connect to 1: success reuse=1
# connect to 1: success reuse=0
# connect to 0: success reuse=0
# connect to 0: success reuse=1
t/session_ticket.t ................ ok
t/sessions.t ...................... ok
t/signal-readline.t ............... ok
t/sni.t ........................... ok
t/sni_verify.t .................... ok
t/start-stopssl.t ................. ok
t/startssl-failed.t ............... ok
t/startssl.t ...................... ok
t/sysread_write.t ................. ok
t/verify_fingerprint.t ............ ok
t/verify_hostname.t ...............
Failed 1/42 subtests
t/verify_hostname_standalone.t .... ok
Test Summary Report
-------------------
t/verify_hostname.t (Wstat: 13 (Signal: PIPE) Tests: 41 Failed: 0)
Non-zero wait status: 13
Parse errors: Bad plan. You planned 42 tests but ran 41.
Files=36, Tests=779, 41 wallclock secs ( 0.09 usr 0.02 sys + 2.66 cusr 0.39 csys = 3.16 CPU)
Result: FAIL
Failed 1/36 test programs. 0/779 subtests failed.
*** Error code 255
Stop.
make[1]: stopped in /magus/work/usr/mports/security/p5-IO-Socket-SSL/work/IO-Socket-SSL-2.060
*** Error code 1
Stop.
make: stopped in /usr/mports/security/p5-IO-Socket-SSL