in reply to Re: IO::Socket::SSL and raspberry
in thread IO::Socket::SSL and raspberry

look a little bit more carefully at what I cat before:) It is this file itself!

Replies are listed 'Best First'.
Re^3: IO::Socket::SSL and raspberry
by Corion (Patriarch) on Jul 24, 2015 at 15:53 UTC

    Yes, but what you posted only shows the summary, not how the test failed.

    If there is no further informaion in the log about how the test failed, run the test manually:

    cpanm --look IO::Socket::SSL perl Makefile.PL make make test perl -Mblib -w t/nonblock.t

    Maybe the test output tells you an easy reason why it failed.

      the output is:
      PERL_DL_NONLAZY=1 /usr/bin/perl "-MExtUtils::Command::MM" "-e" "test_h +arness(0, 'blib/lib', 'blib/arch')" t/*.t t/external/*.t + t/01loadmodule.t .................. 1/3 # openssl version=0x1000105f + + # Net::SSLeay version=1.70 + + # parent IO::Socket::INET version=1.31 + + t/01loadmodule.t .................. ok + + t/acceptSSL-timeout.t ............. ok + + t/alpn.t .......................... skipped: ALPN not available in Net +::SSLeay + t/auto_verify_hostname.t .......... ok + + t/cert_formats.t .................. ok + + t/cert_no_file.t .................. ok + + t/compatibility.t ................. ok + + t/connectSSL-timeout.t ............ ok + + t/core.t .......................... ok + + t/dhe.t ........................... ok + + t/ecdhe.t ......................... ok + + t/external/ocsp.t ................. # tcp connect to www.live.com:443 +ok + t/external/ocsp.t ................. 1/3 # tcp connect to www.google.co +m:443 ok + # tcp connect to revoked.grc.com:443 ok + + # fingerprint matches + + # validation with default CA w/o OCSP ok + + t/external/ocsp.t ................. ok + + t/external/usable_ca.t ............ # found 170 CA certs + + # have root CA for www.google.com in store + + # 5 connections to www.google.com ok + + t/external/usable_ca.t ............ 1/21 # have root CA for www.yahoo. +com in store + # 5 connections to www.yahoo.com ok + + t/external/usable_ca.t ............ 4/21 # have root CA for www.comdir +ect.de in store + # 5 connections to www.comdirect.de ok + + t/external/usable_ca.t ............ 7/21 # have root CA for meine.deut +sche-bank.de in store + # 5 connections to meine.deutsche-bank.de ok + + # have root CA for www.twitter.com in store + + # 5 connections to www.twitter.com ok + + # fingerprint www.twitter.com matches + + # check www.twitter.com against builtin CA store ok + + t/external/usable_ca.t ............ 15/21 # have root CA for www.faceb +ook.com in store + # 5 connections to www.facebook.com ok + + # have root CA for www.live.com in store + + # 5 connections to www.live.com ok + + t/external/usable_ca.t ............ ok + + t/io-socket-inet6.t ............... skipped: no IO::Socket::INET6 avai +lable + t/io-socket-ip.t .................. skipped: usuable IO::Socket::IP is + not available + t/memleak_bad_handshake.t ......... ok + + t/mitm.t .......................... ok + + t/nonblock.t ...................... Failed 2/27 subtests + + t/npn.t ........................... ok t/plain_upgrade_downgrade.t ....... # -- test: newINET start_SSL stop_ +SSL start_SSL + # server accepted new client + + # wait for initial data from client + + # got 0x666f6f from client + + # server: got plain data at start of connection + + # server: TLS upgrade + + t/plain_upgrade_downgrade.t ....... 1/15 # server: TLS downgrade + + # server: TLS upgrade#2 + + t/plain_upgrade_downgrade.t ....... 3/15 # -- test: newSSL stop_SSL co +nnect_SSL + # server accepted new client + + # wait for initial data from client + + # got 0x160301 from client + + # server: TLS upgrade + + # server: TLS downgrade + + # server: TLS upgrade#2 + + # -- test: newSSL:0 connect_SSL stop_SSL connect_SSL + + # server accepted new client + + # wait for initial data from client + + # got 0x666f6f from client + + # server: got plain data at start of connection + + # server: TLS upgrade + + # server: TLS downgrade + + # server: TLS upgrade#2 + + # -- test: newSSL:0 start_SSL stop_SSL connect_SSL + + # server accepted new client + + # wait for initial data from client + + # got 0x666f6f from client + + # server: got plain data at start of connection + + # server: TLS upgrade + + # server: TLS downgrade + + # server: TLS upgrade#2 + + # server accepted new client + + # wait for initial data from client + + # got 0x656e64 from client + + # client requested end of tests + + t/plain_upgrade_downgrade.t ....... ok + + t/protocol_version.t .............. ok + + t/public_suffix_lib_encode_idn.t .. ok + + t/public_suffix_lib_libidn.t ...... ok + + t/public_suffix_lib_uri.t ......... ok + + t/public_suffix_ssl.t ............. ok + + t/readline.t ...................... ok + + t/sessions.t ...................... ok + + t/signal-readline.t ............... ok + + t/sni.t ........................... ok t/sni_verify.t .................... ok + + t/start-stopssl.t ................. ok + + t/startssl-failed.t ............... ok + + t/startssl.t ...................... ok + + t/sysread_write.t ................. ok + + t/verify_fingerprint.t ............ ok + + t/verify_hostname.t ............... ok + + t/verify_hostname_standalone.t .... ok + + + + Test Summary Report + + ------------------- + + t/nonblock.t (Wstat: 0 Tests: 27 Failed: 2) + + Failed tests: 13, 26 + + Files=37, Tests=771, 266 wallclock secs ( 4.09 usr 0.29 sys + 182.73 +cusr 6.65 csys = 193.76 CPU) + Result: FAIL + + Failed 1/37 test programs. 2/771 subtests failed. + + Makefile:783: recipe for target 'test_dynamic' failed + + make: *** [test_dynamic] Error 255

      or in generall: problems still not defined =\

      oh, stop, 13th and 26th right?

        Yes. Maybe the output of the test itself shows more information. Please run it alone as I showed above and post that output.