Skip Menu |

This queue is for tickets about the IO-Socket-SSL CPAN distribution.

Report information
The Basics
Id: 127773
Status: resolved
Priority: 0/
Queue: IO-Socket-SSL

People
Owner: Nobody in particular
Requestors: KES [...] cpan.org
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: 2.064



Subject: Add support for openssl fingerprint
Hi. In situations when you have access only to HOST:PORT and want to pine this certificate this is impossible to call ->get_fingerprint, because it works on: of an established connection and if host have self-signed certificate the connection is not established: SSL connect attempt failed error:14090086:SSL See details [here](https://stackoverflow.com/q/53400241/4632019) When hoster gives me his pubkey I get its fingerprint with openssl: openssl x509 -noout -fingerprint -sha256 -inform pem -in web.feel-safe.net.crt SHA256 Fingerprint=E0:3F:F1:4E:06:18:F7:93:34:6F:91:77:7F:C0:9E:3A:CF:93:F5:BC:12:71:38:30:AC:87:5E:21:7E:CB:7A:58 But this has different format and not suitable for IO::Socket::SSL module =(
This is fixed in 2.064. One can now just cut+paste the fingerprint from the openssl output (i.e. hex and colons) and it will ignore the colons (did already before) and figure out the hash algorithms based on the length of the string (new in 2.064).