[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.20
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
share
/
doc
/
perl-Net-SSLeay
/
examples
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📄 bio.pl
1,204 B
SET
[ EDIT ]
|
[ DEL ]
📄 bulk.pl
1,954 B
SET
[ EDIT ]
|
[ DEL ]
📄 callback.pl
3,194 B
SET
[ EDIT ]
|
[ DEL ]
📄 cb-testi.pl
548 B
SET
[ EDIT ]
|
[ DEL ]
📄 cli-cert.pl
3,805 B
SET
[ EDIT ]
|
[ DEL ]
📄 ephemeral.pl
553 B
SET
[ EDIT ]
|
[ DEL ]
📄 get_authenticated_page.pl
730 B
SET
[ EDIT ]
|
[ DEL ]
📄 get_page.pl
507 B
SET
[ EDIT ]
|
[ DEL ]
📄 get_page_cert.pl
966 B
SET
[ EDIT ]
|
[ DEL ]
📄 https-proxy-snif.pl
4,544 B
SET
[ EDIT ]
|
[ DEL ]
📄 makecert.pl
1,531 B
SET
[ EDIT ]
|
[ DEL ]
📄 minicli.pl
1,340 B
SET
[ EDIT ]
|
[ DEL ]
📄 passwd-cb.pl
809 B
SET
[ EDIT ]
|
[ DEL ]
📄 req.conf
1,232 B
SET
[ EDIT ]
|
[ DEL ]
📄 server_key.pem
963 B
SET
[ EDIT ]
|
[ DEL ]
📄 ssl-inetd-serv.pl
1,642 B
SET
[ EDIT ]
|
[ DEL ]
📄 ssl_diff.pl
631 B
SET
[ EDIT ]
|
[ DEL ]
📄 sslcat.pl
526 B
SET
[ EDIT ]
|
[ DEL ]
📄 sslecho.pl
3,143 B
SET
[ EDIT ]
|
[ DEL ]
📄 stdio_bulk.pl
2,590 B
SET
[ EDIT ]
|
[ DEL ]
📄 tcpcat.pl
422 B
SET
[ EDIT ]
|
[ DEL ]
📄 tcpecho.pl
1,815 B
SET
[ EDIT ]
|
[ DEL ]
📄 x509_cert_details.pl
10,115 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: tcpecho.pl
#!/usr/bin/perl -w # tcpecho.pl - Echo server using TCP # # Copyright (c) 2003 Sampo Kellomaki <sampo@iki.fi>, All Rights Reserved. # $Id: tcpecho.pl,v 1.2 2003/08/17 07:44:47 sampo Exp $ # 17.8.2003, created --Sampo # # Usage: ./tcpecho.pl *port* # # This server always binds to localhost as this is all that is needed # for tests. die "Usage: ./tcpecho.pl *port*\n" unless $#ARGV == 0; ($port) = @ARGV; $our_ip = "\x7F\0\0\x01"; $trace = 2; use Socket; use Net::SSLeay; # # Create the socket and open a connection # $our_serv_params = pack ('S n a4 x8', &AF_INET, $port, $our_ip); socket (S, &AF_INET, &SOCK_STREAM, 0) or die "socket: $!"; bind (S, $our_serv_params) or die "bind: $! (port=$port)"; listen (S, 5) or die "listen: $!"; #while (1) { # uncomment to turn off "one shot" behaviour print "tcpecho $$: Accepting connections on port $port...\n" if $trace>1; ($addr = accept(Net::SSLeay::SSLCAT_S, S)) or die "accept: $!"; $old_out = select(Net::SSLeay::SSLCAT_S); $| = 1; select ($old_out); # Piping hot! if ($trace) { ($af,$client_port,$client_ip) = unpack('S n a4 x8',$addr); @inetaddr = unpack('C4',$client_ip); print "$af connection from " . join ('.', @inetaddr) . ":$client_port\n" if $trace;; } # # Connected. Exchange some data. # $got = Net::SSLeay::tcp_read_all() or die "$$: read failed"; print "tcpecho $$: got " . length($got) . " bytes\n" if $trace==2; print "tcpecho: Got `$got' (" . length ($got) . " chars)\n" if $trace>2; $got = uc $got; Net::SSLeay::tcp_write_all($got) or die "$$: write failed"; $got = ''; # in case it was huge print "tcpecho: Tearing down the connection.\n\n" if $trace>1; close Net::SSLeay::SSLCAT_S; #} close S; __END__