WARNING
No library for handling international domain names found.
It will work but croak if you try to verify an international name against
a certificate.
It's recommended to install URI version>=1.50.
Net::IDN::Encode and Net::LibIDN are also still supported.

# openssl version compiled=0x30500010 linked=0x30500010 -- OpenSSL 3.5.1 1 Jul 2025
# Net::SSLeay version=1.94
# parent IO::Socket::IP version=0.42
# tcp connect to www.bild.de:443 ok
# fingerprint matches
# validation with default CA w/o OCSP ok
# validation with default CA with OCSP defaults ok
# validation with default CA with OCSP full chain ok
# tcp connect to revoked.grc.com:443 ok
# fingerprint matches
# validation with default CA w/o OCSP ok
# found 146 CA certs
# have root CA for www.bild.de in store
# 5 connections to www.bild.de ok
# have root CA for www.yahoo.com in store
# 5 connections to www.yahoo.com ok
# have root CA for www.comdirect.de in store
# 5 connections to www.comdirect.de ok
# fingerprint www.comdirect.de matches
# have root CA for meine.deutsche-bank.de in store
# 5 connections to meine.deutsche-bank.de ok
# fingerprint meine.deutsche-bank.de matches
# have root CA for www.twitter.com in store
# 5 connections to www.twitter.com ok
# have root CA for www.facebook.com in store
# 5 connections to www.facebook.com ok
# have root CA for www.live.com in store
# 5 connections to www.live.com ok
# fingerprint www.live.com matches
# -- test: newINET start_SSL stop_SSL start_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x160301 from client
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL:0 connect_SSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL:0 start_SSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# server accepted new client
# wait for initial data from client
# got 0x656e64 from client
# client requested end of tests
# looks like OpenSSL was compiled without SSLv3 support
# client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256
# accept failed: , SSL accept attempt failed error:0A0000FD:SSL routines::binder does not verify
# client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256
# client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256
# accept failed: , SSL accept attempt failed error:0A0000FD:SSL routines::binder does not verify
# client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256
# accept failed: , SSL accept attempt failed error:0A0000FD:SSL routines::binder does not verify
# client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384
# accept failed: , SSL accept attempt failed error:1C800066:Provider routines::cipher operation failed error:0A000119:SSL routines::decryption failed or bad record mac error:0A000139:SSL routines::record layer failure
# client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384
# client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384
# accept failed: , SSL accept attempt failed error:1C800066:Provider routines::cipher operation failed error:0A000119:SSL routines::decryption failed or bad record mac error:0A000139:SSL routines::record layer failure
# client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384
# accept failed: , SSL accept attempt failed error:1C800066:Provider routines::cipher operation failed error:0A000119:SSL routines::decryption failed or bad record mac error:0A000139:SSL routines::record layer failure
# listen at 127.0.0.1:48627
# listen at 127.0.0.1:40547
# connect to 0: success reuse=0 version=TLSv1_3
# connect to 0: success reuse=1 version=TLSv1_3
# connect to 1: success reuse=1 version=TLSv1_3
# connect to 1: success reuse=0 version=TLSv1_3
# connect to 0: success reuse=0 version=TLSv1_3
# connect to 0: success reuse=1 version=TLSv1_3