Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.31
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
local /
go /
src /
net /
http /
[ HOME SHELL ]
Name
Size
Permission
Action
cgi
[ DIR ]
drwxr-xr-x
cookiejar
[ DIR ]
drwxr-xr-x
fcgi
[ DIR ]
drwxr-xr-x
httptest
[ DIR ]
drwxr-xr-x
httptrace
[ DIR ]
drwxr-xr-x
httputil
[ DIR ]
drwxr-xr-x
internal
[ DIR ]
drwxr-xr-x
pprof
[ DIR ]
drwxr-xr-x
testdata
[ DIR ]
drwxr-xr-x
alpn_test.go
3.03
KB
-rw-r--r--
client.go
31.47
KB
-rw-r--r--
client_test.go
55.36
KB
-rw-r--r--
clientserver_test.go
42.36
KB
-rw-r--r--
clone.go
1.56
KB
-rw-r--r--
cookie.go
10.76
KB
-rw-r--r--
cookie_test.go
17.74
KB
-rw-r--r--
doc.go
3.44
KB
-rw-r--r--
example_filesystem_test.go
2.03
KB
-rw-r--r--
example_handle_test.go
560
B
-rw-r--r--
example_test.go
5.28
KB
-rw-r--r--
export_test.go
7.43
KB
-rw-r--r--
filetransport.go
2.9
KB
-rw-r--r--
filetransport_test.go
1.61
KB
-rw-r--r--
fs.go
23.36
KB
-rw-r--r--
fs_test.go
35.21
KB
-rw-r--r--
h2_bundle.go
320.65
KB
-rw-r--r--
header.go
7.36
KB
-rw-r--r--
header_test.go
5.58
KB
-rw-r--r--
http.go
4.95
KB
-rw-r--r--
http_test.go
4.43
KB
-rw-r--r--
jar.go
900
B
-rw-r--r--
main_test.go
4.41
KB
-rw-r--r--
method.go
517
B
-rw-r--r--
omithttp2.go
1.85
KB
-rw-r--r--
proxy_test.go
1.13
KB
-rw-r--r--
range_test.go
2.38
KB
-rw-r--r--
readrequest_test.go
9.71
KB
-rw-r--r--
request.go
44.68
KB
-rw-r--r--
request_test.go
31.96
KB
-rw-r--r--
requestwrite_test.go
22.79
KB
-rw-r--r--
response.go
10.76
KB
-rw-r--r--
response_test.go
24.05
KB
-rw-r--r--
responsewrite_test.go
6.94
KB
-rw-r--r--
roundtrip.go
563
B
-rw-r--r--
roundtrip_js.go
9.11
KB
-rw-r--r--
serve_test.go
171.18
KB
-rw-r--r--
server.go
105.67
KB
-rw-r--r--
server_test.go
1.19
KB
-rw-r--r--
sniff.go
8
KB
-rw-r--r--
sniff_test.go
8.09
KB
-rw-r--r--
socks_bundle.go
12.93
KB
-rw-r--r--
status.go
7.26
KB
-rw-r--r--
transfer.go
30.3
KB
-rw-r--r--
transfer_test.go
7.31
KB
-rw-r--r--
transport.go
81.6
KB
-rw-r--r--
transport_internal_test.go
5.91
KB
-rw-r--r--
transport_test.go
159.07
KB
-rw-r--r--
triv.go
3.2
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : alpn_test.go
// Copyright 2013 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package http_test import ( "bufio" "bytes" "crypto/tls" "crypto/x509" "fmt" "io" "io/ioutil" . "net/http" "net/http/httptest" "strings" "testing" ) func TestNextProtoUpgrade(t *testing.T) { setParallel(t) defer afterTest(t) ts := httptest.NewUnstartedServer(HandlerFunc(func(w ResponseWriter, r *Request) { fmt.Fprintf(w, "path=%s,proto=", r.URL.Path) if r.TLS != nil { w.Write([]byte(r.TLS.NegotiatedProtocol)) } if r.RemoteAddr == "" { t.Error("request with no RemoteAddr") } if r.Body == nil { t.Errorf("request with nil Body") } })) ts.TLS = &tls.Config{ NextProtos: []string{"unhandled-proto", "tls-0.9"}, } ts.Config.TLSNextProto = map[string]func(*Server, *tls.Conn, Handler){ "tls-0.9": handleTLSProtocol09, } ts.StartTLS() defer ts.Close() // Normal request, without NPN. { c := ts.Client() res, err := c.Get(ts.URL) if err != nil { t.Fatal(err) } body, err := ioutil.ReadAll(res.Body) if err != nil { t.Fatal(err) } if want := "path=/,proto="; string(body) != want { t.Errorf("plain request = %q; want %q", body, want) } } // Request to an advertised but unhandled NPN protocol. // Server will hang up. { certPool := x509.NewCertPool() certPool.AddCert(ts.Certificate()) tr := &Transport{ TLSClientConfig: &tls.Config{ RootCAs: certPool, NextProtos: []string{"unhandled-proto"}, }, } defer tr.CloseIdleConnections() c := &Client{ Transport: tr, } res, err := c.Get(ts.URL) if err == nil { defer res.Body.Close() var buf bytes.Buffer res.Write(&buf) t.Errorf("expected error on unhandled-proto request; got: %s", buf.Bytes()) } } // Request using the "tls-0.9" protocol, which we register here. // It is HTTP/0.9 over TLS. { c := ts.Client() tlsConfig := c.Transport.(*Transport).TLSClientConfig tlsConfig.NextProtos = []string{"tls-0.9"} conn, err := tls.Dial("tcp", ts.Listener.Addr().String(), tlsConfig) if err != nil { t.Fatal(err) } conn.Write([]byte("GET /foo\n")) body, err := ioutil.ReadAll(conn) if err != nil { t.Fatal(err) } if want := "path=/foo,proto=tls-0.9"; string(body) != want { t.Errorf("plain request = %q; want %q", body, want) } } } // handleTLSProtocol09 implements the HTTP/0.9 protocol over TLS, for the // TestNextProtoUpgrade test. func handleTLSProtocol09(srv *Server, conn *tls.Conn, h Handler) { br := bufio.NewReader(conn) line, err := br.ReadString('\n') if err != nil { return } line = strings.TrimSpace(line) path := strings.TrimPrefix(line, "GET ") if path == line { return } req, _ := NewRequest("GET", path, nil) req.Proto = "HTTP/0.9" req.ProtoMajor = 0 req.ProtoMinor = 9 rw := &http09Writer{conn, make(Header)} h.ServeHTTP(rw, req) } type http09Writer struct { io.Writer h Header } func (w http09Writer) Header() Header { return w.h } func (w http09Writer) WriteHeader(int) {} // no headers
Close