- New upstream release 2.058 - Fix memory leak that occured with explicit stop_SSL in connection with non-blocking sockets or timeout (CPAN RT#125867) - Fix redefine warnings in case Socket6 is installed but neither IO::Socket::IP nor IO::Socket::INET6 (CPAN RT#124963) - IO::Socket::SSL::Intercept - optional 'serial' argument can be starting number or callback to create serial number based on the original certificate - New function get_session_reused to check if a session got reused - IO::Socket::SSL::Utils::CERT_asHash: fingerprint_xxx now set to the correct value - Fix t/session_ticket.t: It failed with OpenSSL 1.1.* since this version expects the extKeyUsage of clientAuth in the client cert also to be allowed by the CA if CA uses extKeyUsage
2 lines
167 B
Plaintext
2 lines
167 B
Plaintext
SHA512 (IO-Socket-SSL-2.058.tar.gz) = 87701f107fa44f20661fc0ed214f6910382ff2c2a9054215353b42daea57f77b4fc2eecb753128ebdcf82e834c448a2bce07967cbbe186e2e0e0a78419a4850f
|