WARNING No library for handling international domain names found. It will work but croak if you try to verify an international name against a certificate. It's recommended to install URI version>=1.50. Net::IDN::Encode and Net::LibIDN are also still supported. # openssl version compiled=0x30500010 linked=0x30500010 -- OpenSSL 3.5.1 1 Jul 2025 # Net::SSLeay version=1.94 # parent IO::Socket::IP version=0.42 # tcp connect to www.bild.de:443 ok # fingerprint matches # validation with default CA w/o OCSP ok # validation with default CA with OCSP defaults ok # validation with default CA with OCSP full chain ok # tcp connect to revoked.grc.com:443 ok # fingerprint matches # validation with default CA w/o OCSP ok # found 146 CA certs # have root CA for www.bild.de in store # 5 connections to www.bild.de ok # have root CA for www.yahoo.com in store # 5 connections to www.yahoo.com ok # have root CA for www.comdirect.de in store # 5 connections to www.comdirect.de ok # fingerprint www.comdirect.de matches # have root CA for meine.deutsche-bank.de in store # 5 connections to meine.deutsche-bank.de ok # fingerprint meine.deutsche-bank.de matches # have root CA for www.twitter.com in store # 5 connections to www.twitter.com ok # have root CA for www.facebook.com in store # 5 connections to www.facebook.com ok # have root CA for www.live.com in store # 5 connections to www.live.com ok # fingerprint www.live.com matches # -- test: newINET start_SSL stop_SSL start_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x160301 from client # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 connect_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 start_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # server accepted new client # wait for initial data from client # got 0x656e64 from client # client requested end of tests # looks like OpenSSL was compiled without SSLv3 support # client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 # accept failed: , SSL accept attempt failed error:0A0000FD:SSL routines::binder does not verify # client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 # client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 # accept failed: , SSL accept attempt failed error:0A0000FD:SSL routines::binder does not verify # client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 # accept failed: , SSL accept attempt failed error:0A0000FD:SSL routines::binder does not verify # client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384 # accept failed: , SSL accept attempt failed error:1C800066:Provider routines::cipher operation failed error:0A000119:SSL routines::decryption failed or bad record mac error:0A000139:SSL routines::record layer failure # client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384 # client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384 # accept failed: , SSL accept attempt failed error:1C800066:Provider routines::cipher operation failed error:0A000119:SSL routines::decryption failed or bad record mac error:0A000139:SSL routines::record layer failure # client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384 # accept failed: , SSL accept attempt failed error:1C800066:Provider routines::cipher operation failed error:0A000119:SSL routines::decryption failed or bad record mac error:0A000139:SSL routines::record layer failure # listen at 127.0.0.1:48627 # listen at 127.0.0.1:40547 # connect to 0: success reuse=0 version=TLSv1_3 # connect to 0: success reuse=1 version=TLSv1_3 # connect to 1: success reuse=1 version=TLSv1_3 # connect to 1: success reuse=0 version=TLSv1_3 # connect to 0: success reuse=0 version=TLSv1_3 # connect to 0: success reuse=1 version=TLSv1_3