- New upstream release 2.058
- Fix memory leak that occured with explicit stop_SSL in connection with
non-blocking sockets or timeout (CPAN RT#125867)
- Fix redefine warnings in case Socket6 is installed but neither
IO::Socket::IP nor IO::Socket::INET6 (CPAN RT#124963)
- IO::Socket::SSL::Intercept - optional 'serial' argument can be starting
number or callback to create serial number based on the original certificate
- New function get_session_reused to check if a session got reused
- IO::Socket::SSL::Utils::CERT_asHash: fingerprint_xxx now set to the correct
value
- Fix t/session_ticket.t: It failed with OpenSSL 1.1.* since this version
expects the extKeyUsage of clientAuth in the client cert also to be allowed
by the CA if CA uses extKeyUsage
2 lines
167 B
Plaintext
2 lines
167 B
Plaintext
SHA512 (IO-Socket-SSL-2.058.tar.gz) = 87701f107fa44f20661fc0ed214f6910382ff2c2a9054215353b42daea57f77b4fc2eecb753128ebdcf82e834c448a2bce07967cbbe186e2e0e0a78419a4850f
|