|
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17 System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64 User : nobody ( 99) PHP Version : 5.2.17 Disable Function : NONE Directory : /proc/21573/root/usr/lib/perl5/vendor_perl/5.8.8/Net/ |
Upload File : |
package Net::HTTPS;
# $Id: HTTPS.pm,v 1.3 2002/12/23 18:16:29 gisle Exp $
use strict;
use vars qw($VERSION $SSL_SOCKET_CLASS @ISA);
$VERSION = "1.00";
# Figure out which SSL implementation to use
if ($IO::Socket::SSL::VERSION) {
$SSL_SOCKET_CLASS = "IO::Socket::SSL"; # it was already loaded
}
else {
eval { require Net::SSL; }; # from Crypt-SSLeay
if ($@) {
my $old_errsv = $@;
eval {
require IO::Socket::SSL;
};
if ($@) {
$old_errsv =~ s/\s\(\@INC contains:.*\)/)/g;
die $old_errsv . $@;
}
$SSL_SOCKET_CLASS = "IO::Socket::SSL";
}
else {
$SSL_SOCKET_CLASS = "Net::SSL";
}
}
require Net::HTTP::Methods;
@ISA=($SSL_SOCKET_CLASS, 'Net::HTTP::Methods');
sub configure {
my($self, $cnf) = @_;
$self->http_configure($cnf);
}
sub http_connect {
my($self, $cnf) = @_;
$self->SUPER::configure($cnf);
}
sub http_default_port {
443;
}
# The underlying SSLeay classes fails to work if the socket is
# placed in non-blocking mode. This override of the blocking
# method makes sure it stays the way it was created.
sub blocking { } # noop
1;