晋太元中,武陵人捕鱼为业。缘溪行,忘路之远近。忽逢桃花林,夹岸数百步,中无杂树,芳草鲜美,落英缤纷。渔人甚异之,复前行,欲穷其林。 林尽水源,便得一山,山有小口,仿佛若有光。便舍船,从口入。初极狭,才通人。复行数十步,豁然开朗。土地平旷,屋舍俨然,有良田、美池、桑竹之属。阡陌交通,鸡犬相闻。其中往来种作,男女衣着,悉如外人。黄发垂髫,并怡然自乐。 见渔人,乃大惊,问所从来。具答之。便要还家,设酒杀鸡作食。村中闻有此人,咸来问讯。自云先世避秦时乱,率妻子邑人来此绝境,不复出焉,遂与外人间隔。问今是何世,乃不知有汉,无论魏晋。此人一一为具言所闻,皆叹惋。余人各复延至其家,皆出酒食。停数日,辞去。此中人语云:“不足为外人道也。”(间隔 一作:隔绝) 既出,得其船,便扶向路,处处志之。及郡下,诣太守,说如此。太守即遣人随其往,寻向所志,遂迷,不复得路。 南阳刘子骥,高尚士也,闻之,欣然规往。未果,寻病终。后遂无问津者。
|
Server : Apache System : Linux srv.rainic.com 4.18.0-553.47.1.el8_10.x86_64 #1 SMP Wed Apr 2 05:45:37 EDT 2025 x86_64 User : rainic ( 1014) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /usr/share/doc/perl-IO-Socket-SSL/certs/ |
Upload File : |
use strict;
use warnings;
use IO::Socket::SSL::Utils;
use Net::SSLeay;
my $dir = "./";
my $now = time();
my $later = $now + 10*365*86400;
Net::SSLeay::SSLeay_add_ssl_algorithms();
my $sha256 = Net::SSLeay::EVP_get_digestbyname('sha256') or die;
my $printfp = sub {
my ($w,$cert) = @_;
print $w.' sha256$'.unpack('H*',Net::SSLeay::X509_digest($cert, $sha256))."\n"
};
my %time_valid = (not_before => $now, not_after => $later);
my @ca = CERT_create(
CA => 1,
subject => { CN => 'IO::Socket::SSL Demo CA' },
%time_valid,
);
save('test-ca.pem',PEM_cert2string($ca[0]));
my @server = CERT_create(
CA => 0,
subject => { CN => 'server.local' },
purpose => 'server',
issuer => \@ca,
%time_valid,
);
save('server-cert.pem',PEM_cert2string($server[0]));
save('server-key.pem',PEM_key2string($server[1]));
$printfp->(server => $server[0]);
@server = CERT_create(
CA => 0,
subject => { CN => 'server2.local' },
purpose => 'server',
issuer => \@ca,
%time_valid,
);
save('server2-cert.pem',PEM_cert2string($server[0]));
save('server2-key.pem',PEM_key2string($server[1]));
$printfp->(server2 => $server[0]);
@server = CERT_create(
CA => 0,
subject => { CN => 'server-ecc.local' },
purpose => 'server',
issuer => \@ca,
key => KEY_create_ec(),
%time_valid,
);
save('server-ecc-cert.pem',PEM_cert2string($server[0]));
save('server-ecc-key.pem',PEM_key2string($server[1]));
$printfp->('server-ecc' => $server[0]);
my @client = CERT_create(
CA => 0,
subject => { CN => 'client.local' },
purpose => 'client',
issuer => \@ca,
%time_valid,
);
save('client-cert.pem',PEM_cert2string($client[0]));
save('client-key.pem',PEM_key2string($client[1]));
$printfp->(client => $client[0]);
my @swc = CERT_create(
CA => 0,
subject => { CN => 'server.local' },
purpose => 'server',
issuer => \@ca,
subjectAltNames => [
[ DNS => '*.server.local' ],
[ IP => '127.0.0.1' ],
[ DNS => 'www*.other.local' ],
[ DNS => 'smtp.mydomain.local' ],
[ DNS => 'xn--lwe-sna.idntest.local' ]
],
%time_valid,
);
save('server-wildcard.pem',PEM_cert2string($swc[0]),PEM_key2string($swc[1]));
my @subca = CERT_create(
CA => 1,
issuer => \@ca,
subject => { CN => 'IO::Socket::SSL Demo Sub CA' },
%time_valid,
);
save('test-subca.pem',PEM_cert2string($subca[0]));
@server = CERT_create(
CA => 0,
subject => { CN => 'server.local' },
purpose => 'server',
issuer => \@subca,
%time_valid,
);
save('sub-server.pem',PEM_cert2string($server[0]).PEM_key2string($server[1]));
my @cap = CERT_create(
CA => 1,
subject => { CN => 'IO::Socket::SSL::Intercept' },
%time_valid,
);
save('proxyca.pem',PEM_cert2string($cap[0]).PEM_key2string($cap[1]));
sub save {
my $file = shift;
open(my $fd,'>',$dir.$file) or die $!;
print $fd @_;
}
system(<<CMD);
cd $dir
set -x
openssl x509 -in server-cert.pem -out server-cert.der -outform der
openssl rsa -in server-key.pem -out server-key.der -outform der
openssl rsa -in server-key.pem -out server-key.enc -passout pass:bluebell
openssl rsa -in client-key.pem -out client-key.enc -passout pass:opossum
openssl pkcs12 -export -in server-cert.pem -inkey server-key.pem -out server.p12 -passout pass:
openssl pkcs12 -export -in server-cert.pem -inkey server-key.pem -out server_enc.p12 -passout pass:bluebell
CMD