t/00-install.t ..... 1..35 ok 1 - file exists Changes ok 2 - file exists MANIFEST ok 3 - file exists META.json ok 4 - file exists META.yml ok 5 - file exists Makefile.PL ok 6 - file exists README ok 7 - file exists SEC.xs ok 8 - file exists demo/getkeyset ok 9 - file exists demo/key2ds ok 10 - file exists demo/make-signed-keyset ok 11 - file exists lib/Net/DNS/SEC.pm ok 12 - file exists lib/Net/DNS/SEC/DSA.pm ok 13 - file exists lib/Net/DNS/SEC/Digest.pm ok 14 - file exists lib/Net/DNS/SEC/ECCGOST.pm ok 15 - file exists lib/Net/DNS/SEC/ECDSA.pm ok 16 - file exists lib/Net/DNS/SEC/EdDSA.pm ok 17 - file exists lib/Net/DNS/SEC/Keyset.pm ok 18 - file exists lib/Net/DNS/SEC/Private.pm ok 19 - file exists lib/Net/DNS/SEC/RSA.pm ok 20 - file exists lib/Net/DNS/SEC/libcrypto.pod ok 21 - file exists t/00-install.t ok 22 - file exists t/00-load.t ok 23 - file exists t/00-pod.t ok 24 - file exists t/10-keyset.t ok 25 - file exists t/20-digest.t ok 26 - file exists t/21-RSA-MD5.t ok 27 - file exists t/22-RSA-SHA1.t ok 28 - file exists t/23-RSA-SHA256.t ok 29 - file exists t/24-RSA-SHA512.t ok 30 - file exists t/31-DSA-SHA1.t ok 31 - file exists t/51-ECDSA-P256.t ok 32 - file exists t/52-ECDSA-P384.t ok 33 - file exists t/61-Ed25519.t ok 34 - file exists t/62-Ed448.t ok 35 - file exists typemap ok # # These tests were run using: # File::Find 1.36 # File::Spec 3.75 # IO::File 1.41 # MIME::Base64 3.16 # Net::DNS 1.30 # Net::DNS::SEC 1.18 # Net::DNS::SEC::DSA 1807 # Net::DNS::SEC::Digest 1807 # Net::DNS::SEC::ECDSA 1807 # Net::DNS::SEC::EdDSA 1807 # Net::DNS::SEC::Keyset 1809 # Net::DNS::SEC::Private 1807 # Net::DNS::SEC::RSA 1807 # Net::DNS::SEC::libcrypto 1777 OpenSSL 1.1.1f 31 Mar 2020 # Test::More 1.302183 t/00-load.t ........ 1..4 ok 1 - XS component SEC.xs loaded ok 2 - use Net::DNS::SEC; ok 3 - create consolidated algorithm index ok 4 - XS libcrypto error [libcrypto error (SEC.xs line 505) at t/00-load.t line 56.] ok t/00-pod.t ......... 1..13 ok 1 - POD test for blib/lib/Net/DNS/SEC.pm ok 2 - POD test for blib/lib/Net/DNS/SEC/EdDSA.pm ok 3 - POD test for blib/lib/Net/DNS/SEC/DSA.pm ok 4 - POD test for blib/lib/Net/DNS/SEC/Private.pm ok 5 - POD test for blib/lib/Net/DNS/SEC/ECDSA.pm ok 6 - POD test for blib/lib/Net/DNS/SEC/Digest.pm ok 7 - POD test for blib/lib/Net/DNS/SEC/RSA.pm ok 8 - POD test for blib/lib/Net/DNS/SEC/Keyset.pm ok 9 - POD test for blib/lib/Net/DNS/SEC/ECCGOST.pm ok 10 - POD test for blib/lib/Net/DNS/SEC/libcrypto.pod ok 11 - POD test for demo/make-signed-keyset ok 12 - POD test for demo/getkeyset ok 13 - POD test for demo/key2ds ok t/10-keyset.t ...... 1..29 ok 1 - use Net::DNS::SEC::Keyset; ok 2 - RSASHA1 public key created ok 3 - RSASHA256 public key created ok 4 - RSASHA1 signature created ok 5 - RSASHA256 signature created ok 6 - Keyset object created ok 7 - $keyset->string ok 8 - write Keyset object ok 9 - read Keyset object ok 10 - DS (RSASHA1/SHA-1) created from keyset ok 11 - DS (RSASHA256/SHA-1) created from keyset ok 12 - Corrupted keyset not loaded ok 13 - Expected error message ok 14 - Keyset object from packet ok 15 - Verify method returned the two proper keytags ok 16 - Keyset object from DNSKEY RRset ok 17 - Keyset created from two arrays. ok 18 - Sigs out equal to sigs in ok 19 - Keys out equal to keys in ok 20 - RSA signature created ok 21 - Verify method returned the keytags ok 22 - Verification against keytag 15791 ok 23 - Verification against keytag 9734 failed ok 24 - Expected error message ok 25 - No DS from unverifiable keyset ok 26 - Mixed keyset not loaded ok 27 - Expected error message ok 28 - Expected error message ok 29 - unwritable file ["/home/willem/repos/net-dns-repository/regression-testing/Net-DNS-SEC-1.18/nonexdir/keyset-test.tld.": No such file or directory at /home/willem/repos/net-dns-repository/regression-testing/Net-DNS-SEC-1.18/blib/lib/Net/DNS/SEC/Keyset.pm line 357.] ok t/20-digest.t ...... 1..22 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Digest; ok 3 - message digest MD5 ok 4 - concatenated digest MD5 ok 5 - message digest SHA1 ok 6 - concatenated digest SHA1 ok 7 - message digest SHA224 ok 8 - concatenated digest SHA224 ok 9 - message digest SHA256 ok 10 - concatenated digest SHA256 ok 11 - message digest SHA384 ok 12 - concatenated digest SHA384 ok 13 - message digest SHA512 ok 14 - concatenated digest SHA512 ok 15 - message digest SHA3_224 ok 16 - concatenated digest SHA3_224 ok 17 - message digest SHA3_256 ok 18 - concatenated digest SHA3_256 ok 19 - message digest SHA3_384 ok 20 - concatenated digest SHA3_384 ok 21 - message digest SHA3_512 ok 22 - concatenated digest SHA3_512 ok t/21-RSA-MD5.t ..... 1..8 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::RSA; ok 4 - set up RSA public key ok 5 - set up RSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupt ok t/22-RSA-SHA1.t .... 1..17 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::RSA; ok 4 - set up RSA public key ok 5 - set up RSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupted ok 9 - set up non-RSA public key ok 10 - set up non-RSA private key ok 11 - signature not created using wrong private key ok 12 - verify fails using wrong public key ok 13 - verify fails if signature undefined ok 14 - invalid keyfile: [Kinvalid.private does not appear to be a BIND private key at /home/willem/repos/net-dns-repository/regression-testing/Net-DNS-SEC-1.18/blib/lib/Net/DNS/SEC/Private.pm line 54.] ok 15 - missing keyfile: ["Kinvalid.+0+0.private": No such file or directory at /home/willem/repos/net-dns-repository/regression-testing/Net-DNS-SEC-1.18/blib/lib/Net/DNS/SEC/Private.pm line 58.] ok 16 - unspecified algorithm: [no algorithm specified at /home/willem/repos/net-dns-repository/regression-testing/Net-DNS-SEC-1.18/blib/lib/Net/DNS/SEC/Private.pm line 85.] ok 17 - unspecified signame: [no signame specified at /home/willem/repos/net-dns-repository/regression-testing/Net-DNS-SEC-1.18/blib/lib/Net/DNS/SEC/Private.pm line 86.] ok t/23-RSA-SHA256.t .. 1..8 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::RSA; ok 4 - set up RSA public key ok 5 - set up RSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupt ok t/24-RSA-SHA512.t .. 1..8 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::RSA; ok 4 - set up RSA public key ok 5 - set up RSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupt ok t/31-DSA-SHA1.t .... 1..13 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::DSA; ok 4 - set up DSA public key ok 5 - set up DSA private key ok 6 - set up non-DSA public key ok 7 - set up non-DSA private key ok 8 - signature created using private key ok 9 - signature verified using public key ok 10 - signature not verifiable if data corrupted ok 11 - signature not created using wrong private key ok 12 - verify fails using wrong public key ok 13 - verify fails if signature undefined ok t/51-ECDSA-P256.t .. 1..13 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::ECDSA; ok 4 - set up ECDSA public key ok 5 - set up ECDSA private key ok 6 - set up non-ECDSA public key ok 7 - set up non-ECDSA private key ok 8 - signature created using private key ok 9 - signature verified using public key ok 10 - signature not verifiable if data corrupted ok 11 - signature not created using wrong private key ok 12 - verify fails using wrong public key ok 13 - verify fails if signature undefined ok t/52-ECDSA-P384.t .. 1..8 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::ECDSA; ok 4 - set up ECDSA public key ok 5 - set up ECDSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupted ok t/61-Ed25519.t ..... 1..13 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::EdDSA; ok 4 - set up EdDSA public key ok 5 - set up EdDSA private key ok 6 - set up non-EdDSA public key ok 7 - set up non-EdDSA private key ok 8 - signature created using private key ok 9 - signature verified using public key ok 10 - signature not verifiable if data corrupted ok 11 - signature not created using wrong private key ok 12 - verify fails using wrong public key ok 13 - verify fails if signature undefined ok t/62-Ed448.t ....... 1..8 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::EdDSA; ok 4 - set up EdDSA public key ok 5 - set up EdDSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupt ok All tests successful. Files=14, Tests=199, 6 wallclock secs ( 0.14 usr 0.05 sys + 3.97 cusr 0.94 csys = 5.10 CPU) Result: PASS