in reply to Re^2: IO::Socket::SSL and raspberry
in thread IO::Socket::SSL and raspberry

Yes, but what you posted only shows the summary, not how the test failed.

If there is no further informaion in the log about how the test failed, run the test manually:

cpanm --look IO::Socket::SSL perl Makefile.PL make make test perl -Mblib -w t/nonblock.t

Maybe the test output tells you an easy reason why it failed.

Replies are listed 'Best First'.
Re^4: IO::Socket::SSL and raspberry
by Artimus (Sexton) on Jul 24, 2015 at 17:11 UTC
    the output is:
    PERL_DL_NONLAZY=1 /usr/bin/perl "-MExtUtils::Command::MM" "-e" "test_h +arness(0, 'blib/lib', 'blib/arch')" t/*.t t/external/*.t + t/01loadmodule.t .................. 1/3 # openssl version=0x1000105f + + # Net::SSLeay version=1.70 + + # parent IO::Socket::INET version=1.31 + + t/01loadmodule.t .................. ok + + t/acceptSSL-timeout.t ............. ok + + t/alpn.t .......................... skipped: ALPN not available in Net +::SSLeay + t/auto_verify_hostname.t .......... ok + + t/cert_formats.t .................. ok + + t/cert_no_file.t .................. ok + + t/compatibility.t ................. ok + + t/connectSSL-timeout.t ............ ok + + t/core.t .......................... ok + + t/dhe.t ........................... ok + + t/ecdhe.t ......................... ok + + t/external/ocsp.t ................. # tcp connect to www.live.com:443 +ok + t/external/ocsp.t ................. 1/3 # tcp connect to www.google.co +m:443 ok + # tcp connect to revoked.grc.com:443 ok + + # fingerprint matches + + # validation with default CA w/o OCSP ok + + t/external/ocsp.t ................. ok + + t/external/usable_ca.t ............ # found 170 CA certs + + # have root CA for www.google.com in store + + # 5 connections to www.google.com ok + + t/external/usable_ca.t ............ 1/21 # have root CA for www.yahoo. +com in store + # 5 connections to www.yahoo.com ok + + t/external/usable_ca.t ............ 4/21 # have root CA for www.comdir +ect.de in store + # 5 connections to www.comdirect.de ok + + t/external/usable_ca.t ............ 7/21 # have root CA for meine.deut +sche-bank.de in store + # 5 connections to meine.deutsche-bank.de ok + + # have root CA for www.twitter.com in store + + # 5 connections to www.twitter.com ok + + # fingerprint www.twitter.com matches + + # check www.twitter.com against builtin CA store ok + + t/external/usable_ca.t ............ 15/21 # have root CA for www.faceb +ook.com in store + # 5 connections to www.facebook.com ok + + # have root CA for www.live.com in store + + # 5 connections to www.live.com ok + + t/external/usable_ca.t ............ ok + + t/io-socket-inet6.t ............... skipped: no IO::Socket::INET6 avai +lable + t/io-socket-ip.t .................. skipped: usuable IO::Socket::IP is + not available + t/memleak_bad_handshake.t ......... ok + + t/mitm.t .......................... ok + + t/nonblock.t ...................... Failed 2/27 subtests + + t/npn.t ........................... ok t/plain_upgrade_downgrade.t ....... # -- test: newINET start_SSL stop_ +SSL start_SSL + # server accepted new client + + # wait for initial data from client + + # got 0x666f6f from client + + # server: got plain data at start of connection + + # server: TLS upgrade + + t/plain_upgrade_downgrade.t ....... 1/15 # server: TLS downgrade + + # server: TLS upgrade#2 + + t/plain_upgrade_downgrade.t ....... 3/15 # -- test: newSSL stop_SSL co +nnect_SSL + # server accepted new client + + # wait for initial data from client + + # got 0x160301 from client + + # server: TLS upgrade + + # server: TLS downgrade + + # server: TLS upgrade#2 + + # -- test: newSSL:0 connect_SSL stop_SSL connect_SSL + + # server accepted new client + + # wait for initial data from client + + # got 0x666f6f from client + + # server: got plain data at start of connection + + # server: TLS upgrade + + # server: TLS downgrade + + # server: TLS upgrade#2 + + # -- test: newSSL:0 start_SSL stop_SSL connect_SSL + + # server accepted new client + + # wait for initial data from client + + # got 0x666f6f from client + + # server: got plain data at start of connection + + # server: TLS upgrade + + # server: TLS downgrade + + # server: TLS upgrade#2 + + # server accepted new client + + # wait for initial data from client + + # got 0x656e64 from client + + # client requested end of tests + + t/plain_upgrade_downgrade.t ....... ok + + t/protocol_version.t .............. ok + + t/public_suffix_lib_encode_idn.t .. ok + + t/public_suffix_lib_libidn.t ...... ok + + t/public_suffix_lib_uri.t ......... ok + + t/public_suffix_ssl.t ............. ok + + t/readline.t ...................... ok + + t/sessions.t ...................... ok + + t/signal-readline.t ............... ok + + t/sni.t ........................... ok t/sni_verify.t .................... ok + + t/start-stopssl.t ................. ok + + t/startssl-failed.t ............... ok + + t/startssl.t ...................... ok + + t/sysread_write.t ................. ok + + t/verify_fingerprint.t ............ ok + + t/verify_hostname.t ............... ok + + t/verify_hostname_standalone.t .... ok + + + + Test Summary Report + + ------------------- + + t/nonblock.t (Wstat: 0 Tests: 27 Failed: 2) + + Failed tests: 13, 26 + + Files=37, Tests=771, 266 wallclock secs ( 4.09 usr 0.29 sys + 182.73 +cusr 6.65 csys = 193.76 CPU) + Result: FAIL + + Failed 1/37 test programs. 2/771 subtests failed. + + Makefile:783: recipe for target 'test_dynamic' failed + + make: *** [test_dynamic] Error 255

    or in generall: problems still not defined =\

    oh, stop, 13th and 26th right?

      Yes. Maybe the output of the test itself shows more information. Please run it alone as I showed above and post that output.

        1..27 + + ok # [server] Server Initialization + + ok # [server] tcp accept + + # connect in progress + + ok # [client] client tcp connect + + ok # [server] received plain text + + # wrote 9 bytes + + ok # [client] write plain text + + ok # [server] upgrade to_client to IO::Socket::SSL + + ok # [client] upgrade client to IO::Socket::SSL + + # SSL wants a read first + + # SSL wants a read first + + ok # [client] connected + + ok # [client] nonblocking connect with 2 attempts + + # sndbuf=16384 + + ok # [server] ssl accept handshake done + + ok # [server] received client message + + # read 30000 (1 r/w attempts) + + # $!=Connection reset by peer $SSL_ERROR=SSL write error (5) send=1093 +50 + # connection closed + + ok # [client] syswrite + + not ok # [client] multiple write attempts + + ok # [client] 30000 bytes send + + ok # [server] tcp accept + + # connect in progress + + ok # [client] client tcp connect + + ok # [server] received plain text + + # wrote 9 bytes + + ok # [client] write plain text + + ok # [server] upgrade to_client to IO::Socket::SSL + + ok # [client] upgrade client to IO::Socket::SSL + + # SSL wants a read first + + # SSL wants a read first + + ok # [client] connected + + # sndbuf=16384 + + ok # [server] ssl accept handshake done + + ok # [server] nonblocking accept_SSL with 2 attempts + + ok # [server] received client message + + # read 30000 (2 r/w attempts) + + # $!=Connection reset by peer $SSL_ERROR=SSL write error (5) send=1101 +90 + # connection closed + + ok # [client] syswrite + + not ok # [client] multiple write attempts + + ok # [client] 30000 bytes send

        now I need advice on how to solve dat 'multiple write attempts' if some except crossing these two tests out :D