t/00-install.t ..... 1..36 ok 1 - file exists Changes ok 2 - file exists LICENSE ok 3 - file exists MANIFEST ok 4 - file exists META.json ok 5 - file exists META.yml ok 6 - file exists Makefile.PL ok 7 - file exists README ok 8 - file exists SEC.xs ok 9 - file exists WARNING ok 10 - file exists demo/getkeyset ok 11 - file exists demo/key2ds ok 12 - file exists demo/make-signed-keyset ok 13 - file exists lib/Net/DNS/SEC.pm ok 14 - file exists lib/Net/DNS/SEC/DSA.pm ok 15 - file exists lib/Net/DNS/SEC/Digest.pm ok 16 - file exists lib/Net/DNS/SEC/ECDSA.pm ok 17 - file exists lib/Net/DNS/SEC/EdDSA.pm ok 18 - file exists lib/Net/DNS/SEC/Keyset.pm ok 19 - file exists lib/Net/DNS/SEC/Private.pm ok 20 - file exists lib/Net/DNS/SEC/RSA.pm ok 21 - file exists lib/Net/DNS/SEC/libcrypto.pod ok 22 - file exists t/00-install.t ok 23 - file exists t/00-load.t ok 24 - file exists t/00-pod.t ok 25 - file exists t/10-keyset.t ok 26 - file exists t/20-digest.t ok 27 - file exists t/21-RSA-MD5.t ok 28 - file exists t/22-RSA-SHA1.t ok 29 - file exists t/23-RSA-SHA256.t ok 30 - file exists t/24-RSA-SHA512.t ok 31 - file exists t/31-DSA-SHA1.t ok 32 - file exists t/51-ECDSA-P256.t ok 33 - file exists t/52-ECDSA-P384.t ok 34 - file exists t/61-Ed25519.t ok 35 - file exists t/62-Ed448.t ok 36 - file exists typemap ok # # These tests were run using: # Net::DNS 1.35_03 # Net::DNS::SEC 1.20 # Net::DNS::SEC::libcrypto 1872 OpenSSL 3.0.2 15 Mar 2022 # Carp 1.52 # DynaLoader 1.50 # Exporter 5.76 # ExtUtils::MakeMaker 7.64 # File::Find 1.39 # File::Spec 3.80 # IO::File 1.48 # MIME::Base64 3.16 # Test::More 1.302190 t/00-load.t ........ 1..3 ok 1 - XS component SEC.xs loaded ok 2 - use Net::DNS::SEC; ok 3 - XS libcrypto error [libcrypto error (SEC.xs line 1134) at t/00-load.t line 56.] ok t/00-pod.t ......... 1..12 ok 1 - POD test for blib/lib/Net/DNS/SEC.pm ok 2 - POD test for blib/lib/Net/DNS/SEC/EdDSA.pm ok 3 - POD test for blib/lib/Net/DNS/SEC/Private.pm ok 4 - POD test for blib/lib/Net/DNS/SEC/libcrypto.pod ok 5 - POD test for blib/lib/Net/DNS/SEC/Keyset.pm ok 6 - POD test for blib/lib/Net/DNS/SEC/ECDSA.pm ok 7 - POD test for blib/lib/Net/DNS/SEC/DSA.pm ok 8 - POD test for blib/lib/Net/DNS/SEC/Digest.pm ok 9 - POD test for blib/lib/Net/DNS/SEC/RSA.pm ok 10 - POD test for demo/make-signed-keyset ok 11 - POD test for demo/key2ds ok 12 - POD test for demo/getkeyset ok t/10-keyset.t ...... 1..27 ok 1 - use Net::DNS::SEC::Keyset; ok 2 - RSASHA512 public key created ok 3 - RSASHA256 public key created ok 4 - RSASHA512 signature created ok 5 - RSASHA256 signature created ok 6 - Keyset object created ok 7 - $keyset->string ok 8 - write Keyset object ok 9 - read Keyset object ok 10 - DS (RSASHA512/SHA-256) created from keyset ok 11 - DS (RSASHA256/SHA-256) created from keyset ok 12 - Corrupted keyset not loaded ok 13 - Expected error [key 39948: signature verification failed for keyset test.tld] ok 14 - Keyset created from two arrays. ok 15 - Sigs out equal to sigs in ok 16 - Keys out equal to keys in ok 17 - Verify method returned the keytags ok 18 - Verification against keytag 39948 ok 19 - Verification against keytag 9734 failed ok 20 - Expected error [No signature made with key 9734] ok 21 - No DS from unverifiable keyset ok 22 - Mixed keyset not loaded ok 23 - Expected "No signature for KSK" error ok 24 - Expected "Multiple names" error ok 25 - Verify keyset extracted from packet ok 26 - Verify keyset with no KSK ok 27 - unwritable file ["/home/willem/repos/net-dns-repository/regression-testing/Net-DNS-SEC-1.20/nonexdir/keyset-test.tld.": No such file or directory at t/10-keyset.t line 235.] ok t/20-digest.t ...... 1..22 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Digest; ok 3 - digest algorithm MD5 ok 4 - digest algorithm MD5 (concatenated) ok 5 - digest algorithm SHA1 ok 6 - digest algorithm SHA1 (concatenated) ok 7 - digest algorithm SHA224 ok 8 - digest algorithm SHA224 (concatenated) ok 9 - digest algorithm SHA256 ok 10 - digest algorithm SHA256 (concatenated) ok 11 - digest algorithm SHA384 ok 12 - digest algorithm SHA384 (concatenated) ok 13 - digest algorithm SHA512 ok 14 - digest algorithm SHA512 (concatenated) ok 15 - digest algorithm SHA3_224 ok 16 - digest algorithm SHA3_224 (concatenated) ok 17 - digest algorithm SHA3_256 ok 18 - digest algorithm SHA3_256 (concatenated) ok 19 - digest algorithm SHA3_384 ok 20 - digest algorithm SHA3_384 (concatenated) ok 21 - digest algorithm SHA3_512 ok 22 - digest algorithm SHA3_512 (concatenated) ok t/21-RSA-MD5.t ..... 1..8 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::RSA; ok 4 - set up RSA public key ok 5 - set up RSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupted ok t/22-RSA-SHA1.t .... 1..8 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::RSA; ok 4 - set up RSA public key ok 5 - set up RSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupted ok t/23-RSA-SHA256.t .. 1..17 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::RSA; ok 4 - set up RSA public key ok 5 - set up RSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupted ok 9 - set up non-RSA public key ok 10 - set up non-RSA private key ok 11 - signature not created using wrong private key ok 12 - verify fails using wrong public key ok 13 - verify fails if signature undefined ok 14 - invalid keyfile: [Kinvalid.private does not appear to be a BIND private key at t/23-RSA-SHA256.t line 127.] ok 15 - missing keyfile: ["Kinvalid.+0+0.private": No such file or directory at t/23-RSA-SHA256.t line 131.] ok 16 - unspecified algorithm: [no algorithm specified at t/23-RSA-SHA256.t line 135.] ok 17 - unspecified signame: [no signame specified at t/23-RSA-SHA256.t line 139.] ok t/24-RSA-SHA512.t .. 1..8 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::RSA; ok 4 - set up RSA public key ok 5 - set up RSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupted ok t/31-DSA-SHA1.t .... 1..13 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::DSA; ok 4 - set up DSA public key ok 5 - set up DSA private key ok 6 - set up non-DSA public key ok 7 - set up non-DSA private key ok 8 - signature created using private key ok 9 - signature verified using public key ok 10 - signature not verifiable if data corrupted ok 11 - signature not created using wrong private key ok 12 - verify fails using wrong public key ok 13 - verify fails if signature undefined ok t/51-ECDSA-P256.t .. 1..13 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::ECDSA; ok 4 - set up ECDSA public key ok 5 - set up ECDSA private key ok 6 - set up non-ECDSA public key ok 7 - set up non-ECDSA private key ok 8 - signature created using private key ok 9 - signature verified using public key ok 10 - signature not verifiable if data corrupted ok 11 - signature not created using wrong private key ok 12 - verify fails using wrong public key ok 13 - verify fails if signature undefined ok t/52-ECDSA-P384.t .. 1..8 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::ECDSA; ok 4 - set up ECDSA public key ok 5 - set up ECDSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupted ok t/61-Ed25519.t ..... 1..13 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::EdDSA; ok 4 - set up EdDSA public key ok 5 - set up EdDSA private key ok 6 - set up non-EdDSA public key ok 7 - set up non-EdDSA private key ok 8 - signature created using private key ok 9 - signature verified using public key ok 10 - signature not verifiable if data corrupted ok 11 - signature not created using wrong private key ok 12 - verify fails using wrong public key ok 13 - verify fails if signature undefined ok t/62-Ed448.t ....... 1..8 ok 1 - use Net::DNS::SEC; ok 2 - use Net::DNS::SEC::Private; ok 3 - use Net::DNS::SEC::EdDSA; ok 4 - set up EdDSA public key ok 5 - set up EdDSA private key ok 6 - signature created using private key ok 7 - signature verified using public key ok 8 - signature not verifiable if data corrupted ok All tests successful. Files=14, Tests=196, 2 wallclock secs ( 0.04 usr 0.02 sys + 1.46 cusr 0.25 csys = 1.77 CPU) Result: PASS