Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.112
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
src /
php-7.4.33 /
ext /
openssl /
Delete
Unzip
Name
Size
Permission
Date
Action
.libs
[ DIR ]
drwxr-xr-x
2024-03-12 14:22
tests
[ DIR ]
drwxrwxr-x
2022-10-31 11:36
CREDITS
65
B
-rw-rw-r--
2022-10-31 11:36
config.w32
330
B
-rw-rw-r--
2022-10-31 11:36
config0.m4
1.22
KB
-rw-rw-r--
2022-10-31 11:36
openssl.c
186.12
KB
-rw-rw-r--
2022-10-31 11:36
openssl.lo
324
B
-rw-r--r--
2024-03-12 14:22
openssl.o
882.3
KB
-rw-r--r--
2024-03-12 14:22
php_openssl.h
6.34
KB
-rw-rw-r--
2022-10-31 11:36
xp_ssl.c
77.56
KB
-rw-rw-r--
2022-10-31 11:36
xp_ssl.lo
321
B
-rw-r--r--
2024-03-12 14:22
xp_ssl.o
270.69
KB
-rw-r--r--
2024-03-12 14:22
Save
Rename
PHP_ARG_WITH([openssl], [for OpenSSL support], [AS_HELP_STRING([--with-openssl], [Include OpenSSL support (requires OpenSSL >= 1.0.1)])]) PHP_ARG_WITH([kerberos], [for Kerberos support], [AS_HELP_STRING([--with-kerberos], [OPENSSL: Include Kerberos support])], [no], [no]) PHP_ARG_WITH([system-ciphers], [whether to use system default cipher list instead of hardcoded value], [AS_HELP_STRING([--with-system-ciphers], [OPENSSL: Use system default cipher list instead of hardcoded value])], [no], [no]) if test "$PHP_OPENSSL" != "no"; then PHP_NEW_EXTENSION(openssl, openssl.c xp_ssl.c, $ext_shared) PHP_SUBST(OPENSSL_SHARED_LIBADD) if test "$PHP_KERBEROS" != "no"; then PKG_CHECK_MODULES([KERBEROS], [krb5-gssapi krb5]) PHP_EVAL_INCLINE($KERBEROS_CFLAGS) PHP_EVAL_LIBLINE($KERBEROS_LIBS, OPENSSL_SHARED_LIBADD) fi PHP_SETUP_OPENSSL(OPENSSL_SHARED_LIBADD, [ AC_DEFINE(HAVE_OPENSSL_EXT,1,[ ]) ], [ AC_MSG_ERROR([OpenSSL check failed. Please check config.log for more information.]) ]) if test "$PHP_SYSTEM_CIPHERS" != "no"; then AC_DEFINE(USE_OPENSSL_SYSTEM_CIPHERS,1,[ Use system default cipher list instead of hardcoded value ]) fi AC_CHECK_FUNCS([RAND_egd]) fi