403Webshell
Server IP : 103.119.228.120  /  Your IP : 18.118.119.77
Web Server : Apache
System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64
User : nobody ( 99)
PHP Version : 5.6.40
Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime
MySQL : ON |  cURL : ON |  WGET : ON |  Perl : ON |  Python : ON |  Sudo : ON |  Pkexec : ON
Directory :  /usr/local/ssl/local/ssl/local/share/man/man3/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /usr/local/ssl/local/ssl/local/share/man/man3/Net::FTPSSL.3pm
.\" Automatically generated by Pod::Man 2.27 (Pod::Simple 3.28)
.\"
.\" Standard preamble:
.\" ========================================================================
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Vb \" Begin verbatim text
.ft CW
.nf
.ne \\$1
..
.de Ve \" End verbatim text
.ft R
.fi
..
.\" Set up some character translations and predefined strings.  \*(-- will
.\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
.\" double quote, and \*(R" will give a right double quote.  \*(C+ will
.\" give a nicer C++.  Capital omega is used to do unbreakable dashes and
.\" therefore won't be available.  \*(C` and \*(C' expand to `' in nroff,
.\" nothing in troff, for use with C<>.
.tr \(*W-
.ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
.ie n \{\
.    ds -- \(*W-
.    ds PI pi
.    if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
.    if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\"  diablo 12 pitch
.    ds L" ""
.    ds R" ""
.    ds C` ""
.    ds C' ""
'br\}
.el\{\
.    ds -- \|\(em\|
.    ds PI \(*p
.    ds L" ``
.    ds R" ''
.    ds C`
.    ds C'
'br\}
.\"
.\" Escape single quotes in literal strings from groff's Unicode transform.
.ie \n(.g .ds Aq \(aq
.el       .ds Aq '
.\"
.\" If the F register is turned on, we'll generate index entries on stderr for
.\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
.\" entries marked with X<> in POD.  Of course, you'll have to process the
.\" output yourself in some meaningful fashion.
.\"
.\" Avoid warning from groff about undefined register 'F'.
.de IX
..
.nr rF 0
.if \n(.g .if rF .nr rF 1
.if (\n(rF:(\n(.g==0)) \{
.    if \nF \{
.        de IX
.        tm Index:\\$1\t\\n%\t"\\$2"
..
.        if !\nF==2 \{
.            nr % 0
.            nr F 2
.        \}
.    \}
.\}
.rr rF
.\"
.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
.\" Fear.  Run.  Save yourself.  No user-serviceable parts.
.    \" fudge factors for nroff and troff
.if n \{\
.    ds #H 0
.    ds #V .8m
.    ds #F .3m
.    ds #[ \f1
.    ds #] \fP
.\}
.if t \{\
.    ds #H ((1u-(\\\\n(.fu%2u))*.13m)
.    ds #V .6m
.    ds #F 0
.    ds #[ \&
.    ds #] \&
.\}
.    \" simple accents for nroff and troff
.if n \{\
.    ds ' \&
.    ds ` \&
.    ds ^ \&
.    ds , \&
.    ds ~ ~
.    ds /
.\}
.if t \{\
.    ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
.    ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
.    ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
.    ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
.    ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
.    ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
.\}
.    \" troff and (daisy-wheel) nroff accents
.ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
.ds 8 \h'\*(#H'\(*b\h'-\*(#H'
.ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
.ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
.ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
.ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
.ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
.ds ae a\h'-(\w'a'u*4/10)'e
.ds Ae A\h'-(\w'A'u*4/10)'E
.    \" corrections for vroff
.if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
.if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
.    \" for low resolution devices (crt and lpr)
.if \n(.H>23 .if \n(.V>19 \
\{\
.    ds : e
.    ds 8 ss
.    ds o a
.    ds d- d\h'-1'\(ga
.    ds D- D\h'-1'\(hy
.    ds th \o'bp'
.    ds Th \o'LP'
.    ds ae ae
.    ds Ae AE
.\}
.rm #[ #] #H #V #F C
.\" ========================================================================
.\"
.IX Title "FTPSSL 3"
.TH FTPSSL 3 "2016-07-08" "perl v5.16.3" "User Contributed Perl Documentation"
.\" For nroff, turn off justification.  Always turn off hyphenation; it makes
.\" way too many mistakes in technical documents.
.if n .ad l
.nh
.SH "NAME"
Net::FTPSSL \- A FTP over SSL/TLS class
.SH "VERSION 0.33"
.IX Header "VERSION 0.33"

.SH "SYNOPSIS"
.IX Header "SYNOPSIS"
.Vb 1
\&  use Net::FTPSSL;
\&
\&  my $ftps = Net::FTPSSL\->new(\*(Aqftp.your\-secure\-server.com\*(Aq, 
\&                              Encryption => EXP_CRYPT,
\&                              Debug => 1, DebugLogFile => "myLog.txt",
\&                              Croak => 1);
\&
\&  $ftps\->trapWarn ();     # Only call if opening a CPAN bug report.
\&
\&  $ftps\->login(\*(Aqanonymous\*(Aq, \*(Aquser@localhost\*(Aq);
\&
\&  $ftps\->cwd("/pub");
\&
\&  $ftps\->get("file");
\&
\&  $ftps\->quit();
.Ve
.PP
Since I included \fICroak => 1\fR as an option to \fInew\fR, it automatically
called \fIdie\fR for me if any \fINet::FTPSSL\fR command failed.  So there was no need
for any messy error checking in my code example!
.SH "DESCRIPTION"
.IX Header "DESCRIPTION"
\&\f(CW\*(C`Net::FTPSSL\*(C'\fR is a class implementing a simple \s-1FTP\s0 client over a Secure
Sockets Layer (\s-1SSL\s0) or Transport Layer Security (\s-1TLS\s0) connection written in
Perl as described in \s-1RFC959\s0 and \s-1RFC2228. \s0 It will use \s-1TLS\s0 by default.
.SH "CONSTRUCTOR"
.IX Header "CONSTRUCTOR"
.IP "new( \s-1HOST\s0 [, \s-1OPTIONS \s0] )" 4
.IX Item "new( HOST [, OPTIONS ] )"
Creates a new \fBNet::FTPSSL\fR object and opens a connection with the
\&\f(CW\*(C`HOST\*(C'\fR. \f(CW\*(C`HOST\*(C'\fR is the address of the \s-1FTPS\s0 server and it's a required
argument. \s-1OPTIONS\s0 are passed in a hash like fashion, using key and value
pairs.  If you wish you can also pass \fI\s-1OPTIONS\s0\fR as a hash reference.
.Sp
If it can't create a new \fBNet::FTPSSL\fR object, it will return \fIundef\fR unless
you set the \fICroak\fR option.  In either case you will find the cause of the
failure in \fB\f(CB$Net::FTPSSL::ERRSTR\fB\fR.
.Sp
\&\f(CW\*(C`OPTIONS\*(C'\fR are:
.Sp
\&\fBEncryption\fR \- The connection can be implicitly (\fB\s-1IMP_CRYPT\s0\fR) encrypted,
explicitly (\fB\s-1EXP_CRYPT\s0\fR) encrypted, or regular \s-1FTP \s0(\fB\s-1CLR_CRYPT\s0\fR).
In explicit cases the connection begins clear and became encrypted after an
\&\*(L"\s-1AUTH\*(R"\s0 command is sent, while implicit starts off encrypted.  For \fB\s-1CLR_CRYPT\s0\fR,
the connection never becomes encrypted.  Default value is \fB\s-1EXP_CRYPT\s0\fR.
.Sp
\&\fBPort\fR \- The \fIport\fR number to connect to on the remote \s-1FTPS\s0 server.  The
default \fIport\fR is 21 for \fB\s-1EXP_CRYPT\s0\fR and \fB\s-1CLR_CRYPT\s0\fR.  But for \fB\s-1IMP_CRYPT\s0\fR
the default \fIport\fR is 990.  You only need to provide a \fIport\fR if you need to
override the default value.
.Sp
\&\fBDataProtLevel\fR \- The level of security on the data channel.  The default is
\&\fB\s-1DATA_PROT_PRIVATE\s0\fR, where the data is also encrypted. \fB\s-1DATA_PROT_CLEAR\s0\fR is
for data sent as clear text.  \fB\s-1DATA_PROT_SAFE\s0\fR and \fB\s-1DATA_PROT_CONFIDENTIAL\s0\fR
are not currently supported.  If \fB\s-1CLR_CRYPT\s0\fR was selected, the data channel
is always \fB\s-1DATA_PROT_CLEAR\s0\fR and can't be overridden.
.Sp
\&\fBuseSSL\fR \- Use this option to connect to the server using \s-1SSL\s0 instead of \s-1TLS.
TLS\s0 is the default encryption type and the more secure of the two protocols.
Set \fBuseSSL => 1\fR to use \s-1SSL.\s0
.Sp
\&\fBProxyArgs\fR \- A hash reference to pass to the proxy server.  When a proxy
server is encountered, this class uses \fINet::HTTPTunnel\fR to get through to
the server you need to talk to.  See \fINet::HTTPTunnel\fR for what values are
supported.  Options \fIremote-host\fR and \fIremote-port\fR are hard coded to the
same values as provided by \fI\s-1HOST\s0\fR and \fI\s-1PORT\s0\fR above and cannot be overridden.
.Sp
\&\fBPreserveTimestamp\fR \- During all \fIputs\fR and \fIgets\fR, attempt to preserve the
file's timestamp.  By default it will not preserve the timestamps.
.Sp
\&\fBPret\fR \- Set if you are talking to a distributed \s-1FTPS\s0 server like \fIDrFtpd\fR
that needs a \fB\s-1PRET\s0\fR command issued before all calls to \fB\s-1PASV\s0\fR.  You only need
to use this option if the server barfs at the \fB\s-1PRET\s0\fR auto-detect logic.
.Sp
\&\fBTrace\fR \- Turns on/off (1/0) put/get download tracing to \s-1STDERR. \s0 The default
is off.
.Sp
\&\fBDebug\fR \- This turns the debug tracing option on/off. Default is off. (0,1,2)
.Sp
\&\fBDebugLogFile\fR \- Redirects the output of \fBDebug\fR from \fI\s-1STDERR\s0\fR to the
requested error log file name.  This option is ignored unless \fBDebug\fR is also
turned on.  Enforced this way for backwards compatibility.  If \fBDebug\fR is set
to \fB2\fR, the log file will be opened in \fIappend\fR mode instead of creating a
new log file.  This log file is closed when this class instance goes out of
scope.
.Sp
Instead of a file name, you may instead specify an open file handle or \s-1GLOB\s0 and
it will write the logs there insead.  (\fINot really recommended.\fR)
.Sp
\&\fBCroak\fR \- Force most methods to call \fI\fIcroak()\fI\fR on failure instead of returning
\&\fI\s-1FALSE\s0\fR.  The default is to return \fI\s-1FALSE\s0\fR or \fIundef\fR on failure.  When it
croaks, it will attempt to close the \s-1FTPS\s0 connection as well, preserving the
last message before it attempts to close the connection.  Allowing the server
to know the client is going away.  This will cause \fI\f(CI$Net::FTPSSL::ERRSTR\fI\fR to
be set as well.
.Sp
\&\fBReuseSession\fR \- Tells the \fB\s-1FTP/S\s0\fR server that we wish to reuse the \fIcommand
channel\fR session for all \fIdata channel\fR connections.  (0/1/2/etc.)  It defaults
to \fB0\fR, no reuse.
.Sp
When requested, it will use a default \fIsession cache size\fR of \fB5\fR, but you
can increase the cache's size by setting the \fIReuseSession\fR to a larger value.
Where the \fIsession cache size\fR is (4 + the \fIReuseSession\fR value).
.Sp
\&\fBDisableContext\fR \- Tells the \fB\s-1FTP/S\s0\fR server that we don't wish to reuse the
\&\fIcommand channel\fR context for all \fIdata channel\fR connections.  (0/1)  If
option \fIReuseSession\fR or \fISSL_Client_Certificate\fR are also used, this option
is ignored!  By default the context is always reused on encrypted data channels
via \fBSSL_reuse_ctx\fR.
.Sp
\&\fBSSL_*\fR \- \s-1SSL\s0 arguments which can be applied when \fI\fIstart_SSL()\fI\fR is finally
called to encrypt the command channel.  An alternative to using
\&\fISSL_Client_Certificate\fR.  See \fIIO::Socket::SSL\fR for a list of valid
arguments.
.Sp
\&\fBSSL_Client_Certificate\fR \- Expects a reference to a hash.  It's main purpose
is to allow you to use client certificates when talking to your \fI\s-1FTP/S\s0\fR server.
Options here apply to the creation of the command channel.  And when a data
channel is needed later, it uses the \fBSSL_reuse_ctx\fR option to reuse the
command channel's context.
.Sp
See \fI\fIstart_SSL()\fI\fR in \fIIO::Socket::SSL\fR for more details on this and other
options available besides those for certificates.  If an option provided via
this hash conflicts with other options we would normally use, the entries in
this hash take precedence.
.Sp
\&\fBBuffer\fR \- This is the block size that \fINet::FTPSSL\fR will use when a transfer
is made over the \fIData Channel\fR. Default value is 10240.  It does not affect
the \fICommand Channel\fR.
.Sp
\&\fBTimeout\fR \- Set a connection timeout value. Default value is 120.
.Sp
\&\fBLocalAddr\fR \- Local address to use for all socket connections, this argument
will be passed to all IO::Socket::INET calls.
.Sp
\&\fBOverridePASV\fR \- Some \fI\s-1FTPS\s0\fR servers sitting behind a firewall incorrectly
return their local \s-1IP\s0 Address instead of their external \s-1IP\s0 Address used
outside the firewall where the client is.  To use this option to correct this
problem, you must specify the correct host to use for the \fIdata channel\fR
connection.  This should usually match what you provided as the host!  But if
this server also does load balancing, you are out of luck.  This option may not
be able to help you if multiple \s-1IP\s0 Addresses can be returned.
.Sp
\&\fBOverrideHELP\fR \- Some \fI\s-1FTPS\s0\fR servers on encrypted connections incorrectly send
back part of the response to the \fB\s-1HELP\s0\fR command in clear text instead of it all
being encrypted, breaking the command channel connection.  This class calls
\&\fB\s-1HELP\s0\fR internally via \fI\fIsupported()\fI\fR for some conditional logic, making a work
around necessary to be able to talk to such servers.
.Sp
This option supports three distinct modes to support your needs.  You can pass
a reference to an array that lists all the \fB\s-1FTP\s0\fR commands your sever supports,
you can set it to \fB1\fR to say all commands are supported, or set it to \fB0\fR to
say none of the commands are supported.  See \fI\fIsupported()\fI\fR for more details.
.Sp
This option can also be usefull when your server doesn't support the \fI\s-1HELP\s0\fR
command itself and you need to trigger some of the conditional logic.
.SH "METHODS"
.IX Header "METHODS"
Most of the methods return \fItrue\fR or \fIfalse\fR, true when the operation was
a success and false when failed. Methods like \fBlist\fR or \fBnlst\fR return an
empty array when they fail.  This behavior can be modified by the \fBCroak\fR
option.
.IP "login( \s-1USER, PASSWORD \s0)" 4
.IX Item "login( USER, PASSWORD )"
Use the given information to log into the \s-1FTPS\s0 server.
.IP "\fIquit()\fR" 4
.IX Item "quit()"
This method breaks the connection to the \s-1FTPS\s0 server.
.IP "force_epsv( [1/2] )" 4
.IX Item "force_epsv( [1/2] )"
Used to force \fB\s-1EPSV\s0\fR instead of \fB\s-1PASV\s0\fR when establishing a data channel.
Once this method is called, it is imposible to swap back to \fB\s-1PASV\s0\fR.  This
method should be called as soon as possible after you log in if \fB\s-1EPSV\s0\fR is
required.
.Sp
It does this by sending "\fB\s-1EPSV ALL\s0\fR" to the server.  Afterwards the server
will reject all \fB\s-1EPTR\s0\fR, \fB\s-1PORT\s0\fR and \fB\s-1PASV\s0\fR commands.
.Sp
After "\fB\s-1EPSV ALL\s0\fR" is sent, it will attempt to verify your choice of \s-1IP\s0
Protocol to use: \fB1\fR or \fB2\fR (v4 or v6).  The default is \fB1\fR.  It will use
the selected protocol for all future \fB\s-1EPSV\s0\fR calls.  If you need to change which
protocol to use, you may call this function a second time to swap to the other
\&\fB\s-1EPSV\s0\fR Protocol.
.Sp
This method returns true if it succeeds, or false if it fails.
.IP "set_croak( [1/0] )" 4
.IX Item "set_croak( [1/0] )"
Used to turn the \fICroak\fR option on/off after the \fINet::FTPSSL\fR object has been
created.  It returns the previous \fICroak\fR settings before the change is made.
If you don't provide an argument, all it does is return the current setting.
Provided in case the \fICroak\fR option proves to be too restrictive in some cases.
.IP "list( [\s-1DIRECTORY\s0 [, \s-1PATTERN\s0]] )" 4
.IX Item "list( [DIRECTORY [, PATTERN]] )"
This method returns a list of files in a format similar to this: (Server Specific)
.Sp
.Vb 5
\& drwxrwx\-\-\- 1 owner group          512 May 31 11:16 .
\& drwxrwx\-\-\- 1 owner group          512 May 31 11:16 ..
\& drwxrwx\-\-\- 1 owner group          512 Oct 27  2004 foo
\& drwxrwx\-\-\- 1 owner group          512 Oct 27  2004 pub
\& drwxrwx\-\-\- 1 owner group          512 Mar 29 12:09 bar
.Ve
.Sp
If \fI\s-1DIRECTORY\s0\fR is omitted, the method will return the list of the current
directory.
.Sp
If \fI\s-1PATTERN\s0\fR is provided, it would limit the result similar to the unix \fIls\fR
command or the Windows \fIdir\fR command.  The only wild cards supported are
\&\fB*\fR and \fB?\fR.  (Match 0 or more chars.  Or any one char.) So a pattern of
\&\fIf*\fR, \fI?Oo\fR or \fI\s-1FOO\s0\fR would find just \fIfoo\fR from the list above.  Files with
spaces in their name can cause strange results when searching for a pattern.
.IP "nlst( [\s-1DIRECTORY\s0 [, \s-1PATTERN\s0]] )" 4
.IX Item "nlst( [DIRECTORY [, PATTERN]] )"
Same as \f(CW\*(C`list\*(C'\fR but returns the list in this format:
.Sp
.Vb 3
\& foo
\& pub
\& bar
.Ve
.Sp
Spaces in the filename do not cause problems with the \fI\s-1PATTERN\s0\fR with \f(CW\*(C`nlst\*(C'\fR.
Personally, I suggest using nlst instead of list.
.IP "\fIascii()\fR" 4
.IX Item "ascii()"
Sets the file transfer mode to \s-1ASCII.  \s0\fI\s-1CR LF\s0\fR transformations will be done.
\&\s-1ASCII\s0 is the default transfer mode.
.IP "\fIbinary()\fR" 4
.IX Item "binary()"
Sets the file transfer mode to binary. No \fI\s-1CR LF\s0\fR transformation will be done.
.IP "\fImixedModeAI()\fR" 4
.IX Item "mixedModeAI()"
Mixture of \s-1ASCII &\s0 binary mode.  The server does \fI\s-1CR LF\s0\fR transfernations while
the client side does not.  (For a really weird server)
.IP "\fImixedModeIA()\fR" 4
.IX Item "mixedModeIA()"
Mixture of binary & \s-1ASCII\s0 mode.  The client does \fI\s-1CR LF\s0\fR transfernations while
the server side does not.  (For a really weird server)
.IP "put( \s-1LOCAL_FILE\s0 [, \s-1REMOTE_FILE\s0 [, \s-1OFFSET\s0]] )" 4
.IX Item "put( LOCAL_FILE [, REMOTE_FILE [, OFFSET]] )"
Stores the \fI\s-1LOCAL_FILE\s0\fR onto the remote ftps server. \fI\s-1LOCAL_FILE\s0\fR may be a
file handle, but in this case \fI\s-1REMOTE_FILE\s0\fR is required.
It returns \fBundef\fR if \fI\fIput()\fI\fR fails.
.Sp
If you provide an \fI\s-1OFFSET\s0\fR, this method assumes you are attempting to
continue with an upload that was aborted earlier.  And it's your responsibility
to verify that it's the same file on the server you tried to upload earlier.  By
providing the \fI\s-1OFFSET\s0\fR, this function will send a \fB\s-1REST\s0\fR command to the \s-1FTPS\s0
Server to skip over that many bytes before it starts writing to the file.  This
method will also skip over the requested \fI\s-1OFFSET\s0\fR after opening the
\&\fI\s-1LOCAL_FILE\s0\fR for reading, but if passed a file handle it will assume you've
already positioned it correctly.  If you provide an \fI\s-1OFFSET\s0\fR of \fB\-1\fR, this
method will calculate the offset for you by issuing a \fI\s-1SIZE\s0\fR command against
the file on the \s-1FTPS\s0 server.  So \fI\s-1REMOTE_FILE\s0\fR must already exist to use
\&\fB\-1\fR, or it's an error. It is also an error to make \fI\s-1OFFSET\s0\fR larger than the
\&\fI\s-1REMOTE_FILE\s0\fR.
.Sp
If the \fI\s-1OFFSET\s0\fR you provide turns out to be smaller than the current size of
\&\fI\s-1REMOVE_FILE\s0\fR, the server will truncate the \fI\s-1REMOTE_FILE\s0\fR to that size before
appending to the end of \fI\s-1REMOTE_FILE\s0\fR.  (\fIThis may not be consistent across
all \s-1FTPS\s0 Servers, so don't depend on this feature without testing it first.\fR)
.Sp
If the option \fIPreserveTimestamp\fR was used, and the \s-1FTPS\s0 server supports it,
it will attempt to reset the timestamp on \fI\s-1REMOTE_FILE\s0\fR to the timestamp on
\&\fI\s-1LOCAL_FILE\s0\fR.
.IP "append( \s-1LOCAL_FILE\s0 [, \s-1REMOTE_FILE\s0 [, \s-1OFFSET\s0]] )" 4
.IX Item "append( LOCAL_FILE [, REMOTE_FILE [, OFFSET]] )"
Appends the \fI\s-1LOCAL_FILE\s0\fR onto the \fI\s-1REMOTE_FILE\s0\fR on the ftps server.  If
\&\fI\s-1REMOTE_FILE\s0\fR doesn't exist, the file will be created.  \fI\s-1LOCAL_FILE\s0\fR may be
a file handle, but in this case \fI\s-1REMOTE_FILE\s0\fR is required and \fI\s-1OFFSET\s0\fR is
ignored.  It returns \fBundef\fR if \fI\fIappend()\fI\fR fails.
.Sp
If you provide an \fI\s-1OFFSET\s0\fR, it will skip over that number of bytes in the
\&\fI\s-1LOCAL_FILE\s0\fR except when it was a file handle, but \fBwill not\fR send a \fB\s-1REST\s0\fR
command to the server.  It will just append to the end of \fI\s-1REMOTE_FILE\s0\fR
on the server.  You can also provide an \fI\s-1OFFSET\s0\fR of \fB\-1\fR with the same
limitations as with \fI\fIput()\fI\fR.  If you need the \fB\s-1REST\s0\fR command sent to the
\&\s-1FTPS\s0 server, use \fI\fIput()\fI\fR instead.
.Sp
If the option \fIPreserveTimestamp\fR was used, and the \s-1FTPS\s0 server supports it,
it will attempt to reset the timestamp on \fI\s-1REMOTE_FILE\s0\fR to the timestamp on
\&\fI\s-1LOCAL_FILE\s0\fR.
.IP "uput( \s-1LOCAL_FILE,\s0 [\s-1REMOTE_FILE\s0] )" 4
.IX Item "uput( LOCAL_FILE, [REMOTE_FILE] )"
Stores the \fI\s-1LOCAL_FILE\s0\fR onto the remote ftps server. \fI\s-1LOCAL_FILE\s0\fR may be a
file handle, but in this case \fI\s-1REMOTE_FILE\s0\fR is required.  If \fI\s-1REMOTE_FILE\s0\fR
already exists on the ftps server, a unique name is calculated by the server
for use instead.  But on some servers, the remote server won't take the hint
and will always generate a unique name instead.
.Sp
If the file transfer succeeds, this function will try to return the actual
name used on the remote ftps server.  If it can't figure that out, it will
return what was used for \fI\s-1REMOTE_FILE\s0\fR.  On failure this method will return
\&\fBundef\fR.  If the remote server won't take the hint and we can't figure out
the name it used, we'll return a string containing a single \fB?\fR instead.  In
this case the request worked, but this command has no way to figure out what
name was generated on the remote ftps server.  And we want to return a printable
value that will evaluate to \fBtrue\fR!
.Sp
If the option \fIPreserveTimestamp\fR was used, and the \s-1FTPS\s0 server supports it,
it will attempt to reset the timestamp on the remote file using the file name
being returned by this function to the timestamp on \fI\s-1LOCAL_FILE\s0\fR.  So if the
wrong name is being returned, the wrong file could get it's timestamp updated.
.IP "xput( \s-1LOCAL_FILE,\s0 [\s-1REMOTE_FILE,\s0 [\s-1PREFIX,\s0 [\s-1POSTFIX,\s0 [\s-1BODY\s0]]]] )" 4
.IX Item "xput( LOCAL_FILE, [REMOTE_FILE, [PREFIX, [POSTFIX, [BODY]]]] )"
Use when the directory you are dropping \fI\s-1REMOTE_FILE\s0\fR into is monitored by
a file recognizer that might pick the file up before the file transfer has
completed.  So the file is transferred using a temporary name using a naming
convention that the file recognizer will ignore and is guaranteed to be unique.
Once the file transfer successfully completes, it will be \fIrenamed\fR to
\&\fI\s-1REMOTE_FILE\s0\fR for immediate pickup by the file recognizer.  If you requested
to preserve the file's timestamp, this step is done after the file is renamed
and so can't be 100% guaranteed if the file recognizer picks it up first. Since
if it was done before the rename, other more serious problems could crop up if
the resulting timestamp was old enough.
.Sp
On failure this function will attempt to \fIdelete\fR the scratch file for you if
its at all possible.  You will have to talk to your \s-1FTPS\s0 server administrator on
good values for \fI\s-1PREFIX\s0\fR and \fI\s-1POSTFIX\s0\fR if the defaults are no good for you.
.Sp
\&\fB\s-1PREFIX\s0\fR defaults to \fI_tmp.\fR unless you override it.  Set to "" if you need
to suppress the \fI\s-1PREFIX\s0\fR.  This \fI\s-1PREFIX\s0\fR can be a path to another directory
if needed, but that directory must already exist!  Set to \fIundef\fR to keep this
default and you need to change the default for \fI\s-1POSTFIX\s0\fR or \fI\s-1BODY\s0\fR.
.Sp
\&\fB\s-1POSTFIX\s0\fR defaults to \fI.tmp\fR unless you override it.  Set to "" if you need
to suppress the \fI\s-1POSTFIX\s0\fR.  Set to \fIundef\fR to keep this default and you need
to change the default for \fI\s-1BODY\s0\fR.
.Sp
\&\fB\s-1BODY\s0\fR defaults to \fIclient\-name.PID\fR so that you are guaranteed the temp file
will have an unique name on the remote server.  It is strongly recommended that
you don't override this value.
.Sp
So the temp scratch file would be called something like this by default:
\&\fI_tmp.testclient.51243.tmp\fR.
.Sp
As a final note, if \fI\s-1REMOTE_FILE\s0\fR has path information in it's name, the temp
scratch file will have the same directory added to it unless you override the
\&\fI\s-1PREFIX\s0\fR with a different directory to drop the scratch file into.  This avoids
forcing you to change into the requested directory first when you have multiple
files to send out into multiple directories.
.IP "get( \s-1REMOTE_FILE\s0 [, \s-1LOCAL_FILE\s0 [, \s-1OFFSET\s0]] )" 4
.IX Item "get( REMOTE_FILE [, LOCAL_FILE [, OFFSET]] )"
Retrieves the \fI\s-1REMOTE_FILE\s0\fR from the ftps server. \fI\s-1LOCAL_FILE\s0\fR may be a
filename or a file handle.  It returns \fBundef\fR if \fI\fIget()\fI\fR fails.  You don't
usually need to use \fI\s-1OFFSET\s0\fR.
.Sp
If you provide an \fI\s-1OFFSET\s0\fR, this method assumes your are attempting to
continue with a download that was aborted earlier.  And it's your responsibility
to verify that it's the same file you tried to download earlier.  By providing
the \fI\s-1OFFSET\s0\fR, it will send a \fB\s-1REST\s0\fR command to the \s-1FTPS\s0 Server to skip over
that many bytes before it starts downloading the file again.  If you provide an
\&\fI\s-1OFFSET\s0\fR of \fB\-1\fR, this method will calculate the offset for you based on the
size of \fI\s-1LOCAL_FILE\s0\fR using the current transfer mode.  (\fI\s-1ASCII\s0\fR or \fI\s-1BINARY\s0\fR).
It is an error to set it to \fB\-1\fR if the \fI\s-1LOCAL_FILE\s0\fR is a file handle.
.Sp
On the client side of the download, the \fI\s-1OFFSET\s0\fR will do the following:
Open the file and truncate everything after the given \fI\s-1OFFSET\s0\fR.  So if you
give an \fI\s-1OFFSET\s0\fR that is too big, it's an error.  If it's too small, the
file will be truncated to that \fI\s-1OFFSET\s0\fR before appending what's being
downloaded.  If the \fI\s-1LOCAL_FILE\s0\fR is a file handle, it will assume the file
handle has already been positioned to the proper \fI\s-1OFFEST\s0\fR and it will not
perform a truncate.  Instead it will just append to that file handle's
current location.  Just beware that using huge \fI\s-1OFFSET\s0\fRs in \fB\s-1ASCII\s0\fR mode
can be a bit slow if the \fI\s-1LOCAL_FILE\s0\fR needs to be truncated.
.Sp
If the option \fIPreserveTimestamp\fR was used, and the \s-1FTPS\s0 Server supports it,
it will attempt to reset the timestamp on \fI\s-1LOCAL_FILE\s0\fR to the timestamp on
\&\fI\s-1REMOTE_FILE\s0\fR after the download completes.
.IP "xget( \s-1REMOTE_FILE,\s0 [\s-1LOCAL_FILE,\s0 [\s-1PREFIX,\s0 [\s-1POSTFIX,\s0 [\s-1BODY\s0]]]] )" 4
.IX Item "xget( REMOTE_FILE, [LOCAL_FILE, [PREFIX, [POSTFIX, [BODY]]]] )"
The inverse of \fIxput\fR, where the file recognizer is on the client side.  The
only other difference being what \fB\s-1BODY\s0\fR defaults to.  It defaults to
\&\fIreverse(testclient).PID\fR.  So your default scratch file would be something
like: \fI_tmp.tneilctset.51243.tmp\fR.
.Sp
Just be aware that in this case \fB\s-1LOCAL_FILE\s0\fR can no longer be a file handle.
.IP "transfer( dest_server, \s-1REMOTE_FILE\s0 [, \s-1DEST_FILE\s0 [, \s-1OFFSET\s0]] )" 4
.IX Item "transfer( dest_server, REMOTE_FILE [, DEST_FILE [, OFFSET]] )"
Retrieves the \fI\s-1REMOTE_FILE\s0\fR from the current ftps server and uploads it to
the \fIdest_server\fR as \fI\s-1DEST_FILE\s0\fR without making any copy of the file on your
local file system.  If \fI\s-1DEST_FILE\s0\fR isn't provided, it uses \fI\s-1REMOTE_FILE\s0\fR
on the \fIdest_server\fR.
.Sp
It assumes that \fIdest_server\fR is an \fINet::FTPSSL\fR object and you have
already successfully logged onto \fIdest_server\fR and set both ends to either
binary or ascii mode!  So this function skips over the \s-1CR/LF\s0 logic and lets
the other servers handle it.  You must also set the \fICroak\fR option to the
same value on both ends.
.Sp
Finally, if logging is turned on, the logs to this function will be split
between the logs on each system.  So the logs may be a bit of a pain to follow
since you'd need to look in two places for each half.
.IP "xtransfer( dest_server, \s-1REMOTE_FILE,\s0 [\s-1DEST_FILE,\s0 [\s-1PREFIX,\s0" 4
.IX Item "xtransfer( dest_server, REMOTE_FILE, [DEST_FILE, [PREFIX,"
[\s-1POSTFIX,\s0 [\s-1BODY\s0]]]] )
.Sp
Same as \fItransfer\fR, but it uses a temporary filename on the \fIdest_server\fR
during the transfer.  And then renames it to \fI\s-1DEST_FILE\s0\fR afterwards.
.Sp
See \fIxput\fR for the meaning of the remaining parameters.
.IP "delete( \s-1REMOTE_FILE \s0)" 4
.IX Item "delete( REMOTE_FILE )"
Deletes the indicated \fI\s-1REMOTE_FILE\s0\fR.
.IP "cwd( \s-1DIR \s0)" 4
.IX Item "cwd( DIR )"
Attempts to change directory to the directory given in \fI\s-1DIR\s0\fR on the remote
server.
.IP "pwd( )" 4
.IX Item "pwd( )"
Returns the full pathname of the current directory on the remote server.
.IP "cdup( )" 4
.IX Item "cdup( )"
Changes directory to the parent of the current directory on the remote server.
.IP "mkdir( \s-1DIR \s0)" 4
.IX Item "mkdir( DIR )"
Creates the indicated directory \fI\s-1DIR\s0\fR on the remote server. No recursion at
the moment.
.IP "rmdir( \s-1DIR \s0)" 4
.IX Item "rmdir( DIR )"
Removes the empty indicated directory \fI\s-1DIR\s0\fR on the remote server. No recursion
at the moment.
.IP "noop( )" 4
.IX Item "noop( )"
It requires no action other than the server send an \s-1OK\s0 reply.
.IP "rename( \s-1OLD, NEW \s0)" 4
.IX Item "rename( OLD, NEW )"
Allows you to rename the file on the remote server.
.IP "site( \s-1ARGS \s0)" 4
.IX Item "site( ARGS )"
Send a \s-1SITE\s0 command to the remote server and wait for a response.
.IP "mfmt( time_str, remote_file ) or _mfmt( timestamp, remote_file )" 4
.IX Item "mfmt( time_str, remote_file ) or _mfmt( timestamp, remote_file )"
Both are boolean functions that attempt to reset the remote file's timestamp on
the \s-1FTPS\s0 server and returns true on success.  The 1st version can call croak on
failure if \fICroak\fR is turned on, while the 2nd version will not do this.  The
other difference between these two functions is the format of the file's
timestamp to use.
.Sp
\&\fItime_str\fR expects the timestamp to be \s-1GMT\s0 time in format \fI\s-1YYYYMMDDHHMMSS\s0\fR.
While \fItimestamp\fR expects to be in the same format as returned by
\&\fI\fIlocaltime()\fI\fR.
.IP "mdtm( remote_file )  or  _mdtm( remote_file )" 4
.IX Item "mdtm( remote_file ) or _mdtm( remote_file )"
The 1st version returns the file's timestamp as a string in \fI\s-1YYYYMMDDHHMMSS\s0\fR
format using \s-1GMT\s0 time, it will return \fIundef\fR or call croak on failure.
.Sp
The 2nd version returns the file's timestamp in the same format as returned by
\&\fI\fIlocaltime()\fI\fR and will never call croak.
.IP "size( remote_file )" 4
.IX Item "size( remote_file )"
This function will return \fIundef\fR or croak on failure.  Otherwise it will
return the file's size in bytes, which may also be zero bytes! Just be aware
for text files that the size returned may not match the file's actual size after
the file has been downloaded to your system in \fI\s-1ASCII\s0\fR mode.  This is an \s-1OS\s0
specific issue.  It will always match if you are using \fI\s-1BINARY\s0\fR mode.
.Sp
Also \fI\s-1SIZE\s0\fR may return a different size for \fI\s-1ASCII\s0\fR & \fI\s-1BINARY\s0\fR modes.
This issue depends on what \s-1OS\s0 the \s-1FTPS\s0 server is running under.  Should they
be different, the \fI\s-1ASCII\s0\fR size will be the \fI\s-1BINARY\s0\fR size plus the number of
lines in the file.
.Sp
Finally if the file isn't a regular file, it will return \fIundef\fR.
.IP "\fIlast_message()\fR or \fImessage()\fR" 4
.IX Item "last_message() or message()"
Use either one to collect the last response from the \s-1FTPS\s0 server.  This is the
same response printed to \fI\s-1STDERR\s0\fR when Debug is turned on.  It may also contain
any fatal error message encountered.
.Sp
If you couldn't create a \fINet::FTPSSL\fR object, you should get your error
message from \fI\f(CI$Net::FTPSSL::ERRSTR\fI\fR instead.  Be careful since
\&\fI\f(CI$Net::FTPSSL::ERRSTR\fI\fR is shared between instances of \fINet::FTPSSL\fR, while
\&\fImessage\fR & \fIlast_message\fR \fBare not\fR shared between instances!
.IP "last_status_code( )" 4
.IX Item "last_status_code( )"
Returns the one digit status code associated with the last response from the
\&\s-1FTPS\s0 server.  The status is the first digit from the full 3 digit response code.
.Sp
The possible values are exposed via the following \fB7\fR constants:
\&\s-1CMD_INFO, CMD_OK, CMD_MORE, CMD_REJECT, CMD_ERROR, CMD_PROTECT\s0 and \s-1CMD_PENDING.\s0
.IP "quot( \s-1CMD\s0 [,ARGS] )" 4
.IX Item "quot( CMD [,ARGS] )"
Send a command, that \fINet::FTPSSL\fR does not directly support, to the remote
server and wait for a response.  You are responsible for parsing anything
you need from \fI\fImessage()\fI\fR yourself.
.Sp
Returns the most significant digit of the response code.  So it will ignore
the \fBCroak\fR request.
.Sp
\&\fB\s-1WARNING\s0\fR This call should only be used on commands that do not require
data connections.  Misuse of this method can hang the connection if the
internal list of \s-1FTP\s0 commands using a data channel is incomplete.
.IP "ccc( [ DataProtLevel ] )" 4
.IX Item "ccc( [ DataProtLevel ] )"
Sends the clear command channel request to the \s-1FTPS\s0 server.  If you provide the
\&\fIDataProtLevel\fR, it will change it from the current data protection level to
this one before it sends the \fB\s-1CCC\s0\fR command.  After the \fB\s-1CCC\s0\fR command, the
data channel protection level cannot be changed again and will always remain
at this setting.  Once you execute the \fB\s-1CCC\s0\fR request, you will have to create
a new \fINet::FTPSSL\fR object to secure the command channel again.  \fIDue
to security concerns it is recommended that you do not use this method.\fR
.IP "supported( \s-1CMD\s0 [,SITE_OPT] )" 4
.IX Item "supported( CMD [,SITE_OPT] )"
Returns \fB\s-1TRUE\s0\fR if the remote server supports the given command.  \fI\s-1CMD\s0\fR must
match exactly.  This function will ignore the \fBCroak\fR request.
.Sp
If the \fI\s-1CMD\s0\fR is \s-1SITE\s0 or \s-1FEAT\s0 and \fI\s-1SITE_OPT\s0\fR is supplied, it will also check
if the specified \fI\s-1SITE_OPT\s0\fR sub-command is supported by that command.  Not
all servers will support the use of \fI\s-1SITE_OPT\s0\fR.
.Sp
It determines if a command is supported by calling \fB\s-1HELP\s0\fR and parses the
results for a match.  And if \fB\s-1FEAT\s0\fR is supported it calls \fB\s-1FEAT\s0\fR and adds
these commands to the \fB\s-1HELP\s0\fR list.  The results are cached so \fB\s-1HELP\s0\fR and
\&\fB\s-1FEAT\s0\fR are only called once.
.Sp
Some rare servers send the \fB\s-1HELP\s0\fR results partially encrypted and partially in
clear text, causing the encrypted channel to break.  In that case you will need
to override this method for things to work correctly with these non-conforming
servers.  See the \fIOverrideHELP\fR option in the constructor for how to do this.
.Sp
Some servers don't support the \fB\s-1HELP\s0\fR command itself!  When this happens, this
method will always return \fB\s-1FALSE\s0\fR unless you set the \fIOverrideHELP\fR option in
the constructor.
.Sp
This command assumes that the \fB\s-1FTP/S\s0\fR server is configured correctly.  But
I've run into some servers where \fB\s-1HELP\s0\fR says a command is present when it's
really unknown.  So I'm assuming the reverse may be true sometimes as well.
So when you hit this issue, use \fIOverrideHELP\fR to work arround this problem.
.Sp
This method is used internally for conditional logic usually when checking
if the following \fI\s-1FTP\s0\fR commands are allowed: \fB\s-1ALLO\s0\fR, \fB\s-1NOOP\s0\fR, \fB\s-1HELP\s0\fR,
\&\fB\s-1MFMT\s0\fR, \fB\s-1MDTM\s0\fR, \fB\s-1SIZEZ\s0\fR and \fB\s-1STAT\s0\fR.  The \fB\s-1ALLO\s0\fR command is checked during
all \fIput\fR/\fIget\fR command sequences.  The other commands are not checked as
often.  The functions \fIxput\fR and \fIxtransfer\fR also tests for four more
commands: \fB\s-1STOR\s0\fR, \fB\s-1DELE\s0\fR, \fB\s-1RNFR\s0\fR and \fB\s-1RNTO\s0\fR.
.IP "all_supported( \s-1CMD1\s0 [, \s-1CMD2\s0 [, \s-1CMD3\s0 [, \s-1CMD4\s0 [, ...]]]] )" 4
.IX Item "all_supported( CMD1 [, CMD2 [, CMD3 [, CMD4 [, ...]]]] )"
Similar to \fIsupported\fR, except that it tests everything in this list of one or
more \fI\s-1FTP\s0\fR commands passed to it to see if they are supported.  If the list is
empty, or if even one command in the list isn't supported, it returns \fB\s-1FALSE\s0\fR.
Otherwise it returns \fB\s-1TRUE\s0\fR.  It will also ignore the \fBCroak\fR request.
.IP "restart( \s-1OFFSET \s0)" 4
.IX Item "restart( OFFSET )"
Set the byte offset at which to begin the next data transfer.  \fINet::FTPSSL\fR
simply records this value and uses it during the next data transfer.  For
this reason this method will never return an error, but setting it may cause
subsequent data transfers to fail.
.Sp
I recommend using the \s-1OFFSET\s0 directly in \fI\fIget()\fI\fR, \fI\fIput()\fI\fR, \fI\fIappend()\fI\fR and
\&\fI\fItransfer()\fI\fR instead of using this method.  It was only added to make
\&\fINet::FTPSSL\fR compatible with \fINet::FTP\fR.  A non-zero offset in those methods
will override what you provide here.  If you call any of the other
\&\fI\fIget()\fI\fR/\fI\fIput()\fI\fR variants after calling this function, you will get an error.
.Sp
It is \s-1OK\s0 to use an \fI\s-1OFFSET\s0\fR of \fB\-1\fR here to have \fINet::FTPSSL\fR calculate
the correct \fI\s-1OFFSET\s0\fR for you before it get's used.  Just like if you had
provided it directly to the \fI\fIget()\fI\fR, \fI\fIput()\fI\fR, \fI\fIappend()\fI\fR and \fI\fItransfer()\fI\fR
calls.
.Sp
This \fI\s-1OFFSET\s0\fR will be automatically zeroed out after the 1st time it is used.
.IP "is_file( \s-1FILE \s0)" 4
.IX Item "is_file( FILE )"
Returns true if the passed \fIname\fR is recognized as a regular file on the remote
server.  It's assumed a regular file if the \fIsize\fR function works.
works! (\fI\s-1IE.\s0 returns a size >= 0 Bytes\fR.)
.IP "is_dir( \s-1DIRECTORY \s0)" 4
.IX Item "is_dir( DIRECTORY )"
Returns true if the passed \fIname\fR is recognized as a directory on the remote
server.  It's assumed a directory if you can \fIcwd\fR into it.
.Sp
If you don't have permission to \fIcwd\fR into that directory, this function
\&\fBwill not\fR recognize it as a directory, even if it really is one!
.IP "set_callback( [cb_func_ref, end_cb_func_ref [, cb_data_ref]] )" 4
.IX Item "set_callback( [cb_func_ref, end_cb_func_ref [, cb_data_ref]] )"
This function allows the user to define a callback function to use whenever a
data channel to the server is open.  If either \fBcb_func_ref\fR or
\&\fBend_cb_func_ref\fR is undefined, it disables the callback functionality, since
both are required for call backs to function properly.
.Sp
The \fBcb_func_ref\fR is a reference to a function to handle processing the
data channel data.  This is a \fIvoid\fR function that can be called multiple
times.  It is called each time a chunk of data is read from or written to the
data channel.
.Sp
The \fBend_cb_func_ref\fR is a reference to a function to handle closing the
callback for this data channel connection.  This function is allowed to return
a string of additional data to process before the data channel is closed.  It
is called only once per command after processing all the data channel data.
.Sp
The \fBcb_data_ref\fR is an optional reference to an \fIarray\fR or \fIhash\fR that the
caller can use to store values between calls to the callback function and the
end callback function.  If you don't need such a work area, it's safe to not
provide one.  The \fINet::FTPSSL\fR class doesn't look at this reference.
.Sp
The callback function must take the following \fB5\fR arguments:
.Sp
.Vb 1
\&   B<callback> (ftps_func_name, data_ref, data_len_ref, total_len, cb_data_ref);
.Ve
.Sp
The \fIftps_func_name\fR will tell what \fINet::FTPSSL\fR function requested the
callback so that your \fIcallback\fR function can determine what the data is for
and do conditional logic accordingly.  We don't provide a reference to the
\&\fINet::FTPSSL\fR object itself since the class is not recursive.  Each
\&\fINet::FTPSSL\fR object should have it's own \fIcb_dat_ref\fR to work with.  But
methods within the class can share one.
.Sp
Since we pass the data going through the data channel as a reference, you are
allowed to modify the data.  But if you do, be sure to update \fIdata_len_ref\fR
to the new data length as well if it changes.  Otherwise you will get buggy
responses.  Just be aware that if you change the length, more than likely you'll
be unable to reliably restart an upload or download via \fI\fIrestart()\fI\fR or using
\&\fI\s-1OFFSET\s0\fR in the \fIput\fR & \fIget\fR commands.
.Sp
Finally, the \fItotal_len\fR is how many bytes have already been processed.  It
does not include the data passed for the current \fIcallback\fR call.  So it will
always be zero the first time it's called.
.Sp
Once we finish processing data for the data channel, a different callback
function will be called to tell you that the data channel is closing.  That will
be your last chance to affect what is going over the data channel and to do any
needed post processing.  The end callback function must take the following
arguments:
.Sp
.Vb 1
\&   $end = B<end_callback> (ftps_func_name, total_len, cb_data_ref);
.Ve
.Sp
These arguments have the same meaning as for the callback function, except that
this function allows you to optionally provide additional data to/from the data
channel.  If reading from the data channel, it will treat the return value as
the last data returned before it was closed.  Otherwise it will be written to
the data channel before it is closed.  Please return \fIundef\fR if there is
nothing extra for the \fINet::FTPSSL\fR command to process.
.Sp
You should also take care to clean up the contents of \fIcb_data_ref\fR in the
\&\fIend_callback\fR function.  Otherwise the next callback sequence that uses this
work area may behave strangely.
.Sp
As a final note, should the data channel be empty, it is very likely that just
the \fIend_callback\fR function will be called without any calls to the \fIcallback\fR
function.
.IP "\fIget_log_filehandle()\fR" 4
.IX Item "get_log_filehandle()"
Returns the open file handle for the file specified by the \fBDebugLogFile\fR
option specified by \f(CW\*(C`new()\*(C'\fR.  If you did not use this option, it will return
undef.
.Sp
Just be aware that once this object goes out of scope, the returned file handle
becomes invalid.
.IP "set_dc_from_hash( \s-1HASH \s0)" 4
.IX Item "set_dc_from_hash( HASH )"
This function provides you a way to micro manage the \fI\s-1SSL\s0\fR characteristics
of the \s-1FTPS\s0 Data Channel without having to hack the Net::FTPSSL code base.
It should be called as soon as possible after the call to \fB\f(BInew()\fB\fR.
.Sp
It takes a \fI\s-1HASH\s0\fR as it's argument.  Either by value or by address.
This hash of key/value pairs will be used to control the Data Channel
\&\fI\s-1SSL\s0\fR options.
.Sp
If the key's value is set to \fIundef\fR, it is an instruction to delete an
existing Data Channel option.  If the key has a value it is an instruction to
add this key/value pair to the Data Channel options.  If the option already
exists, it will override that value.
.Sp
It returns the number of entries updated for the Data Channel.
.IP "copy_cc_to_dc( \s-1FORCE, ARRAY \s0)" 4
.IX Item "copy_cc_to_dc( FORCE, ARRAY )"
This function provides you a way to copy some of the \fI\s-1SSL\s0\fR options used
to manage the Command Channel over to the Data Channel as well without
having to hack the Net::FTPSSL code base.  It should be called as soon
as possible after the call to \fB\f(BInew()\fB\fR.
.Sp
It takes an \fI\s-1ARRAY\s0\fR as it's arguments.  Either by value or by address.
It looks up each array value in the Command Channel's \fI\s-1SSL\s0\fR characteristics
and copies them over to use as a Data Channel option.
.Sp
If the option doen't exist for the Command Channel, that array entry is ignored.
.Sp
If the option is already set in the Data Channel, the array entry overrides
the current value in the Data Channel.
.Sp
It returns the number of entries updated for the Data Channel.
.IP "\fItrapWarn()\fR" 4
.IX Item "trapWarn()"
This method is only active if \fIDebug\fR is turned on with \fIDebugLogFile\fR
provided as well.  Otherwise calling it does nothing.  This trap for \fIwarnings\fR
is automatically turned off when the the instance of this class goes out of
scope.  It returns \fB1\fR if the trap was turned on, else \fB0\fR if it wasn't.
.Sp
Calling this method causes all \fBPerl\fR \fIwarnings\fR to be written to the log
file you specified when you called \fI\fInew()\fI\fR.  The \fIwarnings\fR will appear in
the log file when they occur to assist in debugging this module.  It
automatically puts the word \fI\s-1WARNING:\s0\fR in front of the message being logged.
.Sp
So this method is only really useful if you wish to open a \fB\s-1CPAN\s0\fR ticket to
report a problem with \fINet::FTPSSL\fR and you think having the generated warning
showing up in the logs will help in getting your issue resolved.
.Sp
You may call this method for multiple \fINet::FTPSSL\fR instances and it will
cause the \fIwarning\fR to be written to multiple log files.
.Sp
If your program already traps \fIwarnings\fR before you call this method, this
code will forward the warning to your trap logic as well.
.SH "INTERPRETING THE LOGS"
.IX Header "INTERPRETING THE LOGS"
The logs generated by \fINet::FTPSSL\fR are very easy to interpret.  After you get
past the initial configuration information needed to support opening a \fI\s-1CPAN\s0\fR
ticket, it's basically the \fB\s-1FTPS\s0\fR traffic going back and forth between your
perl \fIClient\fR and the \fI\s-1FTPS\s0 Server\fR you are talking to.
.PP
Each line begins with a prefix that tells what is happening.
.PP
\&\f(CW\*(C`>>>\*(C'\fR \- Represents outbound traffic sent to the \s-1FTPS\s0 Server.
.PP
\&\f(CW\*(C`<<<\*(C'\fR \- Represents inbound traffic received from the \s-1FTPS\s0 Server.
.PP
\&\f(CW\*(C`<<+\*(C'\fR \- Represents messages from \fINet::FTPSSL\fR itself in response to
a request that doesn't hit the \fI\s-1FTPS\s0 Server\fR.
.PP
\&\f(CW\*(C`WARNING:\*(C'\fR \- Represents a trapped \fIperl warning\fR written to the logs.
.PP
\&\f(CW\*(C`SKT >>>\*(C'\fR & \f(CW\*(C`SKT <<<\*(C'\fR represent socket traffic
before the \fINet::FTPSSL\fR object gets created.
.PP
There are a couple of other rare variants to the above theme.  But they are
purely information only.  So this is basically it.
.SH "AUTHORS"
.IX Header "AUTHORS"
Marco Dalla Stella \- <kral at paranoici dot org>
.PP
Curtis Leach \- <cleach at cpan dot org> \- As of v0.05
.SH "SEE ALSO"
.IX Header "SEE ALSO"
\&\fINet::Cmd\fR
.PP
\&\fINet::FTP\fR
.PP
\&\fINet::SSLeay::Handle\fR
.PP
\&\fIIO::Socket::SSL\fR
.PP
\&\s-1RFC 959 \- \s0<http://www.rfc\-editor.org/info/rfc959>
.PP
\&\s-1RFC 2228 \- \s0<http://www.rfc\-editor.org/info/rfc2228>
.PP
\&\s-1RFC 2246 \- \s0<http://www.rfc\-editor.org/info/rfc2246>
.PP
\&\s-1RFC 4217 \- \s0<http://www.rfc\-editor.org/info/rfc4217>
.SH "CREDITS"
.IX Header "CREDITS"
Graham Barr <gbarr at pobox dot com> \- for have written such a great
collection of modules (libnet).
.SH "BUGS"
.IX Header "BUGS"
Please report any bugs with a \s-1FTPS\s0 log file created via options \fBDebug=>1\fR
and \fBDebugLogFile=>\*(L"file.txt\*(R"\fR along with your sample code at
<http://search.cpan.org/~cleach/Net\-FTPSSL\-0.33/FTPSSL.pm> or
<https://metacpan.org/pod/Net::FTPSSL>.
.PP
Patches are appreciated when a log file and sample code are also provided.
.SH "COPYRIGHT"
.IX Header "COPYRIGHT"
Copyright (c) 2009 \- 2016 Curtis Leach. All rights reserved.
.PP
Copyright (c) 2005 Marco Dalla Stella. All rights reserved.
.PP
This program is free software; you can redistribute it and/or modify it under
the same terms as Perl itself.

Youez - 2016 - github.com/yon3zu
LinuXploit