view release on metacpan or search on metacpan
lib/Furl.pm view on Meta::CPAN
=head1 TIPS
=over 4
=item L<IO::Socket::SSL> preloading
Furl interprets the C<timeout> argument as the maximum time the module is permitted to spend before returning an error.
The module also lazy-loads L<IO::Socket::SSL> when an HTTPS request is being issued for the first time. Loading the module usually takes ~0.1 seconds.
The time spent for loading the SSL module may become an issue in case you want to impose a very small timeout value for connection establishment. In such case, users are advised to preload the SSL module explicitly.
=back
lib/Furl.pm view on Meta::CPAN
}
);
=item HTTPS requests claims warnings!
When you make https requests, IO::Socket::SSL may complain about it like:
*******************************************************************
Using the default of SSL_verify_mode of SSL_VERIFY_NONE for client
is depreciated! Please set SSL_verify_mode to SSL_VERIFY_PEER
together with SSL_ca_file|SSL_ca_path for verification.
lib/Furl.pm view on Meta::CPAN
SSL_verify_mode explicitly to SSL_VERIFY_NONE in your application.
*******************************************************************
You should set C<SSL_verify_mode> explicitly with Furl's C<ssl_opts>.
use IO::Socket::SSL;
my $ua = Furl->new(
ssl_opts => {
SSL_verify_mode => SSL_VERIFY_PEER(),
},
);
See L<IO::Socket::SSL> for details.
=back
=head1 AUTHOR
lib/Furl.pm view on Meta::CPAN
=head1 SEE ALSO
L<LWP>
L<IO::Socket::SSL>
L<Furl::HTTP>
L<Furl::Response>
view all matches for this distribution
view release on metacpan or search on metacpan
lib/FusionInventory/Agent/HTTP/Client.pm view on Meta::CPAN
# Fedora also backported this behaviour change in its LWP5 package, so
# just checking on LWP version is not enough
$self->{ua}->ssl_opts(verify_hostname => 0, SSL_verify_mode => 0)
if $self->{ua}->can('ssl_opts');
} else {
# only IO::Socket::SSL can perform full server certificate validation,
# Net::SSL is only able to check certification authority, and not
# certificate hostname
IO::Socket::SSL->require();
die
"IO::Socket::SSL Perl module not available, " .
"unable to validate SSL certificates " .
"(workaround: use 'no-ssl-check' configuration parameter)"
if $EVAL_ERROR;
# Activate SSL Debug if Stderr is in backends
lib/FusionInventory/Agent/HTTP/Client.pm view on Meta::CPAN
$self->{ua}->ssl_opts(SSL_ca_path => $self->{ca_cert_dir})
if $self->{ca_cert_dir};
} else {
# SSL_verifycn_scheme and SSL_verifycn_name are required
die
"IO::Socket::SSL Perl module too old " .
"(available: $IO::Socket::SSL::VERSION, required: 1.14), " .
"unable to validate SSL certificates " .
"(workaround: use 'no-ssl-check' configuration parameter)"
if $IO::Socket::SSL::VERSION < 1.14;
# use a custom HTTPS handler to workaround default LWP5 behaviour
FusionInventory::Agent::HTTP::Protocol::https->use(
ca_cert_file => $self->{ca_cert_file},
ca_cert_dir => $self->{ca_cert_dir},
view all matches for this distribution
view release on metacpan or search on metacpan
# Allows you to check new mails, retrieving new mails and information about them
# $Id: Checker.pm,v 1.04 2004/12/13 22:52:17 sacred Exp $
use strict;
use IO::Socket::SSL;
use Carp;
use vars qw($VERSION);
$VERSION = 1.04;
}
sub login {
my $self = shift;
my ($login, $passwd) = @_;
my $not = new IO::Socket::SSL "pop.gmail.com:995" or die IO::Socket::SSL->errstr();
$self->{SOCK} = $not;
my $line = <$not>; # Reading the welcome message
print $not "USER $login\r\n";
$line = <$not>;
if ($line !~ /^\+OK/) { print "Wrong username, please check your settings.\n"; $self->close(); } # We are not allowing USER on transaction state.
=item C<new>
Creates the wrapper object.
The L<IO::Socket::SSL> object is stored as $object->{SOCK}.
It currently only accepts username and password as hash options.
=over 4
- Correct bugs ?
=head1 SEE ALSO
L<IO::Socket::SSL>, L<WWW::GMail>
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Google/Ads/AdWords/Client.pm view on Meta::CPAN
}
return $self->get___enabled_auth_handler();
}
# Private method to setup IO::Socket::SSL and Crypt::SSLeay variables
# for certificate and hostname validation.
sub __setup_SSL {
my ( $self, $ca_path, $ca_file ) = @_;
if ( $ca_path || $ca_file ) {
$ENV{HTTPS_CA_DIR} = $ca_path;
$ENV{HTTPS_CA_FILE} = $ca_file;
eval {
require IO::Socket::SSL;
require Net::SSLeay;
IO::Socket::SSL::set_ctx_defaults(
verify_mode => Net::SSLeay->VERIFY_PEER(),
SSL_verifycn_scheme => "www",
ca_file => $ca_file,
ca_path => $ca_path
);
lib/Google/Ads/AdWords/Client.pm view on Meta::CPAN
Refer to L<Google::Ads::AdWords::AuthTokenHandler> for more details.
=head2 __setup_SSL (Private)
Setups IO::Socket::SSL and Crypt::SSLeay enviroment variables to work with
SSL certificate validation.
=head3 Parameters
The path to the certificate authorites folder and the path to the certificate
view all matches for this distribution
view release on metacpan or search on metacpan
},
"runtime" : {
"requires" : {
"Array::Utils" : "0",
"File::ShareDir" : "0",
"IO::Socket::SSL" : "0",
"List::MoreUtils" : "0",
"Modern::Perl" : "1.20180701",
"Mojolicious" : "0",
"Role::Tiny" : "0",
"Text::Autoformat" : "0",
view all matches for this distribution
view release on metacpan or search on metacpan
## Dependencies
Perl Modules (or Debian modules):
* File::ShareDir::Install or libfile-sharedir-install-perl
* IO::Socket::SSL or libio-socket-ssl-perl
* LWP::UserAgent or liblwp-useragent-perl
* List::MoreUtils or liblist-moreutils-perl
* Modern::Perl or libmodern-perl-perl
* Mojolicious or libmojolicious-perl
* Role::Tiny::With or librole-tiny-perl
If you are going to build IO::Socket::SSL, then youâll need OpenSSL
development libraries installed: openssl-devel or equivalent,
depending on your package manager.
To install from the working directory (which will also install all the
dependencies from CPAN unless you installed them beforehand using your
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Games/Axmud/Session.pm view on Meta::CPAN
connectObj => undef,
# For SSH connections, the Net::OpenSSH and Perl pty (an IO::Tty filehandle) objects
# ('undef' for telnet/SSL connections and when not connected)
sshObj => undef,
ptyObj => undef,
# For SSL connections, the IO::Socket::SSL object ('undef' for telnet/SSH connections
# and when not connected)
sslObj => undef,
# The number of packets received (i.e. the number of times $self->processIncomingData
# has been called) during this session
packetCount => 0,
lib/Games/Axmud/Session.pm view on Meta::CPAN
return undef;
}
} elsif ($protocol eq 'ssl') {
# Connect using IO::Socket::SSL and GA::Obj::Telnet
$sslObj = IO::Socket::SSL->new(
PeerAddr => $host,
PeerPort => $port,
SSL_verify_mode => 0x00,
);
lib/Games/Axmud/Session.pm view on Meta::CPAN
);
} else {
# For SSH, ivp4/ipv6 is already supported by the code above
# For SSL, ipv4 and ipv6 are already enabled, due to IO::Socket::SSL being able to call
# on IO::Socket::INET6
$connectObj->errmode( sub { return $self->connectionError(shift); } );
}
# If the connection is refused (e.g. an invalid host is specified),
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Gearman/Objects.pm view on Meta::CPAN
use constant DEFAULT_PORT => 4730;
use Carp ();
use IO::Socket::IP ();
use IO::Socket::SSL ();
use Socket ();
use List::MoreUtils qw/
first_index
/;
lib/Gearman/Objects.pm view on Meta::CPAN
=head2 socket($js, [$timeout])
depends on C<use_ssl>
prepare L<IO::Socket::IP>
or L<IO::Socket::SSL>
=over
=item
lib/Gearman/Objects.pm view on Meta::CPAN
Timeout => $t || 1
);
my $sc = "IO::Socket::IP";
if ($js->{use_ssl}) {
$sc = "IO::Socket::SSL";
for (qw/ ca_file cert_file key_file /) {
$js->{$_} || next;
$opts{ join('_', "SSL", $_) } = $js->{$_};
}
} ## end if ($js->{use_ssl})
lib/Gearman/Objects.pm view on Meta::CPAN
my $s = $sc->new(%opts);
unless ($s) {
$self->debug() && Carp::carp("connection failed error='$@'",
$js->{use_ssl}
? ", ssl_error='$IO::Socket::SSL::SSL_ERROR'"
: "");
} ## end unless ($s)
return $s;
} ## end sub socket
view all matches for this distribution
view release on metacpan or search on metacpan
},
"runtime" : {
"requires" : {
"Carp" : "0",
"HTTP::Tiny" : "0",
"IO::Socket::SSL" : "0",
"JSON" : "0",
"URI" : "0",
"perl" : "5.008001"
}
},
view all matches for this distribution
view release on metacpan or search on metacpan
0.22 2019-04-29
- add support for new, optional "roadinfo" parameter
0.21 2019-02-22
- require IO::Socket::SSL to make https requests, thanks SREZIC
- remove 'use feature qw(say)' from a test, also thanks SREZIC
0.20 2019-02-18
- use JSON::MaybeXS as using CPanel::JSON::XS directly seems to
to be causing test failures
view all matches for this distribution
view release on metacpan or search on metacpan
"Code::TidyAll" : "0.78",
"Cpanel::JSON::XS" : "0",
"Data::Dumper" : "0",
"HTTP::Tiny" : "0",
"IO::Socket::IP" : "0.39",
"IO::Socket::SSL" : "2.060",
"List::Util" : "0",
"Net::Ping" : "0",
"Net::Ping::External" : "0",
"Net::SSLeay" : "1.49",
"Perl::Tidy" : "20210111",
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Gepok.pm view on Meta::CPAN
Path for file containing certificates of reputable authorties for certificate
verification. This is optional.
=head2 ssl_ca_path => STR
According to L<IO::Socket::SSL> this is only of interest if you are
"unusually friendly with the OpenSSL documentation". This is optional.
=head2 start_servers => INT (default 3)
Number of children to fork at the start of run. If you set this to 0, the server
view all matches for this distribution
view release on metacpan or search on metacpan
cpanfile.snapshot view on Meta::CPAN
File::Spec::Functions 0
perl 5.008
IO-Socket-SSL-2.074
pathname: S/SU/SULLR/IO-Socket-SSL-2.074.tar.gz
provides:
IO::Socket::SSL 2.074
IO::Socket::SSL::Intercept 2.056
IO::Socket::SSL::OCSP_Cache 2.074
IO::Socket::SSL::OCSP_Resolver 2.074
IO::Socket::SSL::PublicSuffix undef
IO::Socket::SSL::SSL_Context 2.074
IO::Socket::SSL::SSL_HANDLE 2.074
IO::Socket::SSL::Session_Cache 2.074
IO::Socket::SSL::Utils 2.015
requirements:
ExtUtils::MakeMaker 0
Mozilla::CA 0
Net::SSLeay 1.46
Scalar::Util 0
cpanfile.snapshot view on Meta::CPAN
provides:
LWP::Protocol::https 6.10
LWP::Protocol::https::Socket 6.10
requirements:
ExtUtils::MakeMaker 0
IO::Socket::SSL 1.54
LWP::Protocol::http 0
LWP::UserAgent 6.06
Mozilla::CA 20180117
Net::HTTPS 6
base 0
view all matches for this distribution
view release on metacpan or search on metacpan
"requires" : {
"Class::Accessor::Lite" : "0.08",
"Crypt::JWT" : "0.025",
"CryptX" : "0.066",
"Furl" : "3.13",
"IO::Socket::SSL" : "0",
"JSON" : "4.02",
"Time::Moment" : "0",
"perl" : "5.008001"
}
},
view all matches for this distribution
view release on metacpan or search on metacpan
lib/GitHub/Authorization.pm view on Meta::CPAN
use HTTP::Tiny;
use MIME::Base64;
use Params::Validate ':all';
# for SSL and SSL CA verification
use IO::Socket::SSL 1.56;
use Mozilla::CA;
use namespace::clean;
use Sub::Exporter::Progressive -setup => {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/GitHub/Extract.pm view on Meta::CPAN
use File::Temp 0.21 ();
use File::pushd 1.00 ();
use HTTP::Tiny 0.019 ();
use Params::Util 1.00 ();
use Archive::Extract 0.56 ();
use IO::Socket::SSL 1.56 (); # Needed for HTTP::Tiny SSL
our $VERSION = '0.02';
our $WARN = 1;
our $DEBUG = 0;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/GitHub/RSS.pm view on Meta::CPAN
use Filter::signatures;
use feature 'signatures';
no warnings 'experimental::signatures';
use PerlX::Maybe;
use IO::Socket::SSL;
use Net::GitHub;
use DBI;
use JSON;
use Data::Dumper;
view all matches for this distribution
view release on metacpan or search on metacpan
cpanfile.snapshot view on Meta::CPAN
Exporter 5.57
ExtUtils::MakeMaker 6.30
IO-Socket-SSL-1.998
pathname: S/SU/SULLR/IO-Socket-SSL-1.998.tar.gz
provides:
IO::Socket::SSL 1.998
IO::Socket::SSL::Intercept 1.93
IO::Socket::SSL::OCSP_Cache 1.998
IO::Socket::SSL::OCSP_Resolver 1.998
IO::Socket::SSL::PublicSuffix undef
IO::Socket::SSL::SSL_Context 1.998
IO::Socket::SSL::SSL_HANDLE 1.998
IO::Socket::SSL::Session_Cache 1.998
IO::Socket::SSL::Utils 0.03
requirements:
ExtUtils::MakeMaker 0
Mozilla::CA 0
Net::SSLeay 1.46
Scalar::Util 0
cpanfile.snapshot view on Meta::CPAN
provides:
LWP::Protocol::https 6.06
LWP::Protocol::https::Socket 6.06
requirements:
ExtUtils::MakeMaker 0
IO::Socket::SSL 1.54
LWP::UserAgent 6.06
Mozilla::CA 20110101
Net::HTTPS 6
perl 5.008001
Module-Build-0.4210
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Google/Ads/AdWords/Client.pm view on Meta::CPAN
}
return $self->get___enabled_auth_handler();
}
# Private method to setup IO::Socket::SSL and Crypt::SSLeay variables
# for certificate and hostname validation.
sub __setup_SSL {
my ($self, $ca_path, $ca_file) = @_;
if ($ca_path || $ca_file) {
$ENV{HTTPS_CA_DIR} = $ca_path;
$ENV{HTTPS_CA_FILE} = $ca_file;
eval {
require IO::Socket::SSL;
require Net::SSLeay;
IO::Socket::SSL::set_ctx_defaults(
verify_mode => Net::SSLeay->VERIFY_PEER(),
SSL_verifycn_scheme => "www",
ca_file => $ca_file,
ca_path => $ca_path
);
lib/Google/Ads/AdWords/Client.pm view on Meta::CPAN
Refer to L<Google::Ads::AdWords::OAuth2ApplicationsHandler> for more details.
=head2 __setup_SSL (Private)
Setups IO::Socket::SSL and Crypt::SSLeay environment variables to work with
SSL certificate validation.
=head3 Parameters
The path to the certificate authorites folder and the path to the certificate
view all matches for this distribution
view release on metacpan or search on metacpan
"File::Spec" => 0,
"File::Temp" => 0,
"FindBin" => 0,
"Getopt::Long" => 0,
"HTTP::Server::Simple::CGI" => 0,
"IO::Socket::SSL" => 0,
"JSON::Parse" => 0,
"JSON::SL" => 0,
"JSON::XS" => 0,
"JSON::WebToken" => 0,
"List::Util" => 0,
view all matches for this distribution
view release on metacpan or search on metacpan
},
"runtime" : {
"requires" : {
"Cpanel::JSON::XS" : "4.08",
"HTTP::Tiny" : "0.076",
"IO::Socket::SSL" : "1.56",
"Net::SSLeay" : "1.49",
"perl" : "5.022001"
}
},
"test" : {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Google/Plus.pm view on Meta::CPAN
use Mojo::Base -base;
use v5.10.1;
use Mojo::URL;
use Mojo::UserAgent;
use IO::Socket::SSL 1.37;
use Carp;
has [qw/key ua/];
our $service = 'https://www.googleapis.com/plus/v1';
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Google/Voice.pm view on Meta::CPAN
use strict;
use warnings;
use Mojo::UserAgent;
use Mojo::JSON;
use IO::Socket::SSL 1.37;
use Google::Voice::Feed;
use Google::Voice::Call;
use Mojo::Base -base;
view all matches for this distribution
view release on metacpan or search on metacpan
cpanfile.snapshot view on Meta::CPAN
Exporter 5.57
ExtUtils::MakeMaker 6.30
IO-Socket-SSL-2.012
pathname: S/SU/SULLR/IO-Socket-SSL-2.012.tar.gz
provides:
IO::Socket::SSL 2.012
IO::Socket::SSL::Intercept 1.93
IO::Socket::SSL::OCSP_Cache 2.012
IO::Socket::SSL::OCSP_Resolver 2.012
IO::Socket::SSL::PublicSuffix undef
IO::Socket::SSL::SSL_Context 2.012
IO::Socket::SSL::SSL_HANDLE 2.012
IO::Socket::SSL::Session_Cache 2.012
IO::Socket::SSL::Utils 0.031
requirements:
ExtUtils::MakeMaker 0
Mozilla::CA 0
Net::SSLeay 1.46
Scalar::Util 0
cpanfile.snapshot view on Meta::CPAN
provides:
LWP::Protocol::https 6.06
LWP::Protocol::https::Socket 6.06
requirements:
ExtUtils::MakeMaker 0
IO::Socket::SSL 1.54
LWP::UserAgent 6.06
Mozilla::CA 20110101
Net::HTTPS 6
perl 5.008001
Lexical-SealRequireHints-0.007
view all matches for this distribution
view release on metacpan or search on metacpan
* XML::DOM (Have not tested lower than v1.26). Requires James Clark's
expat library:
* To access SSL urls you will need Crypt::SSLeay and/or
IO::Socket::SSL.
Optional Prerequisites.
* Crypt::SSLeay if you'd like to use https. Crypt::SSLeay requires the
openssl library as well. See Crypt::SSLeay's excellent install
instructions for how to get https support into LWP (and hence
view all matches for this distribution
view release on metacpan or search on metacpan
#
# This package derived almost entirely from HTTP::Daemon,
# owned by Gisle Aas. Changes include minor alterations in
# the documentation to reflect the use of IO::Socket::SSL
# and modified new(),accept() functions that use IO::Socket::SSL
use strict;
package HTTP::Daemon::SSL;
=head1 DESCRIPTION
Instances of the I<HTTP::Daemon::SSL> class are HTTP/1.1 servers that
listen on a socket for incoming requests. The I<HTTP::Daemon::SSL> is a
sub-class of I<IO::Socket::SSL>, so you can perform socket operations
directly on it too.
The accept() method will return when a connection from a client is
available. In a scalar context the returned value will be a reference
to a object of the I<HTTP::Daemon::ClientConn::SSL> class which is another
I<IO::Socket::SSL> subclass. In a list context a two-element array
is returned containing the new I<HTTP::Daemon::ClientConn::SSL> reference
and the peer address; the list will be empty upon failure. (Note that version
1.02 erroneously did not honour list context). Calling
the get_request() method on the I<HTTP::Daemon::ClientConn::SSL> object
will read data from the client and return an I<HTTP::Request> object
=cut
use vars qw($VERSION @ISA $PROTO $DEBUG);
use IO::Socket::SSL;
use HTTP::Daemon;
$VERSION = "1.04";
@ISA = qw(IO::Socket::SSL HTTP::Daemon);
=item $d = new HTTP::Daemon::SSL
The constructor takes the same parameters as the
I<IO::Socket::SSL> constructor. It can also be called without specifying
any parameters, but you will have to make sure that you have an SSL certificate
and key for the server in F<certs/server-cert.pem> and F<certs/server-key.pem>.
See the IO::Socket::SSL documentation for how to change these default locations
and specify many other aspects of SSL behavior. The daemon will then set up a
listen queue of 5 connections and allocate some random port number. A server
that wants to bind to some specific address on the standard HTTPS port will be
constructed like this:
sub accept
{
my $self = shift;
my $pkg = shift || "HTTP::Daemon::ClientConn::SSL";
my ($sock, $peer) = IO::Socket::SSL::accept($self,$pkg);
if ($sock) {
${*$sock}{'httpd_daemon'} = $self;
return wantarray ? ($sock, $peer) : $sock;
}
else {
"HTTPS instead.\n");
}
$self->kill_socket;
}
# we're not overriding any methods here, but we are inserting IO::Socket::SSL
# into the message dispatch tree
package HTTP::Daemon::ClientConn::SSL;
use vars qw(@ISA $DEBUG);
@ISA = qw(IO::Socket::SSL HTTP::Daemon::ClientConn);
*DEBUG = \$HTTP::Daemon::DEBUG;
=head1 SEE ALSO
RFC 2068
L<IO::Socket::SSL>, L<HTTP::Daemon>, L<Apache>
=head1 COPYRIGHT
Code and documentation from HTTP::Daemon Copyright 1996-2001, Gisle Aas
Changes Copyright 2003-2004, Peter Behroozi
view all matches for this distribution
view release on metacpan or search on metacpan
HTTP::Daemon::Threaded TO DO:
- add a STDERR error log redirect
- SSL support via Crypt::SSLeay(or IO::Socket::SSL) + OpenSSL
- better optimization for CGIAdapter
- add user auth support
view all matches for this distribution
view release on metacpan or search on metacpan
lib/HTTP/Handy.pm view on Meta::CPAN
$env->{'psgi.input'}->read($body, $env->{CONTENT_LENGTH} || 0);
my %post = HTTP::Handy->parse_query($body);
=head1 HTTPS
HTTP::Handy does not support HTTPS. TLS requires C<IO::Socket::SSL> and
OpenSSL, which depend on Perl 5.8+ and external C libraries.
For local personal use, this is not a problem: modern browsers treat
C<127.0.0.1> and C<localhost> as secure contexts and do not show
HTTPS warnings for HTTP on these addresses.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/HTTP/Promise.pm view on Meta::CPAN
If environment variable C<PERL_LWP_SSL_CA_PATH> or C<HTTPS_CA_DIR> is set, then the ssl option property C<SSL_ca_path> takes its value.
=back
Other options can be set and are processed directly by the SSL Socket implementation in use. See L<IO::Socket::SSL> or L<Net::SSL> for details.
Example of C<ssl_opts>:
my $ssl_opts =
{
SSL_ca_file => "/usr/local/lib/perl5/site_perl/5.36.1/Mozilla/CA/cacert.pem",
SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_PEER(), # Explicit constant for clarity
SSL_verifycn_scheme => "www",
SSL_hostname => $host, # Explicit SNI; prevents issues if PeerHost changes
SSL_version => "TLSv1_2:TLSv1_3", # Enforce modern TLS (adjust for legacy if needed)
# SSL_fingerprint => "sha256$your_cert_fingerprint", # If pinning a specific cert
# SSL_ocsp_mode => IO::Socket::SSL::SSL_OCSP_TRY_STAPLE(), # For revocation checks
};
=item * C<threshold>
Integer. Sets the content length threshold beyond which, the response content will be stored to a locale file. It can then be fetch with L</file>. Default to global variable C<$CONTENT_SIZE_THRESHOLD>, which is C<undef> by default.
lib/HTTP/Promise.pm view on Meta::CPAN
If environment variable C<PERL_LWP_SSL_CA_PATH> or C<HTTPS_CA_DIR> is set, then the ssl option property C<SSL_ca_path> takes its value.
=back
Other options can be set and are processed directly by the SSL Socket implementation in use. See L<IO::Socket::SSL> or L<Net::SSL> for details.
=head2 stop_if
Sets or gets a callback code reference (reference to a perl subroutine or an anonymous subroutine) that will be used to determine if we should keep trying upon reading data from the filehandle and an C<EINTR> error occurs.
view all matches for this distribution
view release on metacpan or search on metacpan
Config::Tiny: 0
File::Slurp: 0
File::Temp: 0
HTTP::Headers: 1.64
HTTP::Proxy: 0.22
IO::Socket::SSL: 0
Net::SSLeay: 0
Path::Class: 0
resources:
license: http://opensource.org/licenses/mit-license.php
version: 0.004
view all matches for this distribution