Result:
found 296 distributions and 1081 files matching your query ! ( run in 2.235 )


WWW-Suffit-Server

 view release on metacpan or  search on metacpan

lib/WWW/Suffit/Server.pm  view on Meta::CPAN

        no_daemonize => 1,

        # Security
        mysecret => 'Eph9Ce$quo.p2@oW3',
        rsa_keysize => 2048,
        private_key => undef, # Auto
        public_key => undef, # Auto

        # Initialization options
        all_features    => 'no',
        config_opts     => {

lib/WWW/Suffit/Server.pm  view on Meta::CPAN


The project name. For example: MyApp

Default: current class name

=head2 private_key

    private_key => '...'

Private RSA key

=head2 project_version

lib/WWW/Suffit/Server.pm  view on Meta::CPAN

    my %keysdata = $app->gen_rsakeys;
    my %keysdata = $app->gen_rsakeys( 2048 );

This helper generates RSA keys pair and returns structure as hash:

    private_key => '...',
    public_key  => '...',
    key_size    => 2048,
    error       => '...',

=head2 jwt

lib/WWW/Suffit/Server.pm  view on Meta::CPAN

has 'loglevel' => 'warn';   # warn
has 'max_history_size' => MAX_HISTORY_SIZE;

# Security
has 'mysecret' => DEFAULT_SECRET; # Secret
has 'private_key' => '';    # Private RSA key
has 'public_key' => '';     # Public RSA key
has 'rsa_keysize' => sub { shift->conf->latest("/rsa_keysize") };
has 'trustedproxies' => sub { [grep {length} @{(shift->conf->list("/trustedproxy"))}] };

# Prefork

lib/WWW/Suffit/Server.pm  view on Meta::CPAN

    $self->mysecret($self->conf->latest("/secret")) if $self->conf->latest("/secret");
    $self->secrets([$self->mysecret]);

    # Init RSA keys (optional)
    if ($all_features || is_true_flag($opts->{init_rsa_keys} // $self->init_rsa_keys)) {
        my $private_key_file = $self->conf->latest("/privatekeyfile") || path($self->datadir, PRIVATEKEYFILE)->to_string;
        my $public_key_file = $self->conf->latest("/publickeyfile") || path($self->datadir, PUBLICKEYFILE)->to_string;
        if ((!-r $private_key_file) and (!-r $public_key_file)) {
            my $rsa = WWW::Suffit::RSA->new();
            $rsa->key_size($self->rsa_keysize) if $self->rsa_keysize;
            $rsa->keygen;
            path($private_key_file)->spew($rsa->private_key)->chmod(0600);
            $self->private_key($rsa->private_key);
            path($public_key_file)->spew($rsa->public_key)->chmod(0644);
            $self->public_key($rsa->public_key);
        } elsif (!-r $private_key_file) {
            $self->raise("Can't read RSA private key file: \"%s\"", $private_key_file);
        } elsif (!-r $public_key_file) {
            $self->raise("Can't read RSA public key file: \"%s\"", $public_key_file);
        } else {
            $self->private_key(path($private_key_file)->slurp);
            $self->public_key(path($public_key_file)->slurp)
        }
    }

    # Init AuthDB plugin (optional)

lib/WWW/Suffit/Server.pm  view on Meta::CPAN

}
sub _getJWT {
    my $self = shift;
    return WWW::Suffit::JWT->new(
        secret      => $self->app->mysecret,
        private_key => $self->app->private_key,
        public_key  => $self->app->public_key,
    );
}
sub _genCacheKey {
    my $self = shift;

lib/WWW/Suffit/Server.pm  view on Meta::CPAN

    my $self = shift;
    my $key_size = shift || $self->app->rsa_keysize;
    my $rsa = WWW::Suffit::RSA->new();
       $rsa->key_size($key_size) if $key_size;
       $rsa->keygen;
    my ($private_key, $public_key) = ($rsa->private_key // '', $rsa->public_key // '');
    return (
        private_key => $private_key,
        public_key  => $public_key,
        key_size    => $rsa->key_size,
        error       => $rsa->error
            ? sprintf("Error occurred while generation %s bit RSA keys: %s",  $rsa->key_size // '?', $rsa->error)
            : '',

 view all matches for this distribution


WWW-Suffit-UserAgent

 view release on metacpan or  search on metacpan

lib/WWW/Suffit/UserAgent.pm  view on Meta::CPAN

    my $url_str = $client->path2url("/foo/bar", 1);
        # http://localhost:8695/foo/bar

Sets path to url

=head2 private_key

    $clinet = $clinet->private_key("---- BEGIN ... END -----");
    my $private_key = $client->private_key;

Sets or returns RSA private key

=head2 public_key

lib/WWW/Suffit/UserAgent.pm  view on Meta::CPAN

    $args{token} //= "";
    $args{token_name} ||= TOKEN_HEADER_NAME;

    # Security
    $args{public_key} //= "";
    $args{private_key} //= "";

    # Proxy string
    $args{proxy} //= "";

    # Transaction (tx)

lib/WWW/Suffit/UserAgent.pm  view on Meta::CPAN

        $self->{public_key} = $k;
        return $self;
    }
    return $self->{public_key};
}
sub private_key {
    my $self = shift;
    my $k = shift;
    if (defined $k) {
        $self->{private_key} = $k;
        return $self;
    }
    return $self->{private_key};
}
sub proxy {
    my $self = shift;
    my $p = shift;
    return $self->{proxy} unless defined $p;

 view all matches for this distribution


Weather-WeatherKit

 view release on metacpan or  search on metacpan

lib/Weather/WeatherKit.pm  view on Meta::CPAN


    my $wk = Weather::WeatherKit->new(
        team_id    => $apple_team_id,          # Apple Developer Team Id
        service_id => $weatherkit_service_id,  # WeatherKit Service Id
        key_id     => $key_id,                 # WeatherKit developer key ID
        key        => $private_key             # Encrypted private key (PEM)
    );
    
    # Request current weather:
    my $report = $wk->get(
        lat      => $lat,      # Latitude

lib/Weather/WeatherKit.pm  view on Meta::CPAN


    my $wk = Weather::WeatherKit->new(
        team_id    => "MLU84X58U4",
        service_id => "com.domain.myweatherapp",
        key_id     => $key_id,
        key        => $private_key?,
        key_file   => $private_key_pem?,
        language   => $lang_code?,
        timeout    => $timeout_sec?,
        expiration => $expire_secs?,
        ua         => $lwp_ua?,
        curl       => $use_curl?

 view all matches for this distribution


WebService-Braintree

 view release on metacpan or  search on metacpan

lib/WebService/Braintree.pm  view on Meta::CPAN


    my $conf = WebService::Braintree->configuration;
    $conf->environment( 'sandbox' );
    $conf->merchant_id( 'use_your_merchant_id' );
    $conf->public_key( 'use_your_public_key' );
    $conf->private_key( 'use_your_private_key' );

    my $result = WebService::Braintree::Transaction->sale(
        ...
    );

lib/WebService/Braintree.pm  view on Meta::CPAN


    my $gateway = WebService::Braintree::Gateway->new({
        environment => 'sandbox',
        merchant_id => 'use_your_merchant_id',
        public_key  => 'use_your_public_key',
        private_key => 'use_your_private_key',
    });

    my $result = $gateway->transaction->sale(
        ...
    );

lib/WebService/Braintree.pm  view on Meta::CPAN

be:

    {
      "merchant_id": "<< value 1 >>",
      "public_key": "<< value 2 >>",
      "private_key": "<< value 3 >>"
    }

replacing what's in the double-quotes with the appropriate values from your
Braintree sandbox's dashboard.

 view all matches for this distribution


WebService-Cryptsy

 view release on metacpan or  search on metacpan

examples/api.pl  view on Meta::CPAN

use WebService::Cryptsy;
use lib qw(lib  ../lib);

my $cryp = WebService::Cryptsy->new(
    public_key => 'YOUR PUBLIC KEY',
    private_key => 'YOUR PRIVATE KEY',
);

my $market_data = $cryp->marketdatav2
    or die "Error fetching data: " . $cryp->error;

 view all matches for this distribution


WebService-Fastly

 view release on metacpan or  search on metacpan

lib/WebService/Fastly/LoggingBigqueryApi.pm  view on Meta::CPAN

# @param string $response_condition The name of an existing condition in the configured endpoint, or leave blank to always execute. (optional)
# @param string $format A Fastly [log format string](https://www.fastly.com/documentation/guides/integrations/streaming-logs/custom-log-formats/). Must produce JSON that matches the schema of your BigQuery table. (optional)
# @param string $log_processing_region The geographic region where the logs will be processed before streaming. Valid values are &#x60;us&#x60;, &#x60;eu&#x60;, and &#x60;none&#x60; for global. (optional, default to 'none')
# @param int $format_version The version of the custom logging format used for the configured endpoint. The logging call gets placed by default in &#x60;vcl_log&#x60; if &#x60;format_version&#x60; is set to &#x60;2&#x60; and in &#x60;vcl_deliver&#x60...
# @param string $user Your Google Cloud Platform service account email address. The &#x60;client_email&#x60; field in your service account authentication JSON. Not required if &#x60;account_name&#x60; is specified. (optional)
# @param string $secret_key Your Google Cloud Platform account secret key. The &#x60;private_key&#x60; field in your service account authentication JSON. Not required if &#x60;account_name&#x60; is specified. (optional)
# @param string $account_name The name of the Google Cloud Platform service account associated with the target log collection service. Not required if &#x60;user&#x60; and &#x60;secret_key&#x60; are provided. (optional)
# @param string $dataset Your BigQuery dataset. (optional)
# @param string $table Your BigQuery table. (optional)
# @param string $template_suffix BigQuery table name suffix template. Optional. (optional)
# @param string $project_id Your Google Cloud Platform project ID. Required (optional)

lib/WebService/Fastly/LoggingBigqueryApi.pm  view on Meta::CPAN

        description => 'Your Google Cloud Platform service account email address. The &#x60;client_email&#x60; field in your service account authentication JSON. Not required if &#x60;account_name&#x60; is specified.',
        required => '0',
    },
    'secret_key' => {
        data_type => 'string',
        description => 'Your Google Cloud Platform account secret key. The &#x60;private_key&#x60; field in your service account authentication JSON. Not required if &#x60;account_name&#x60; is specified.',
        required => '0',
    },
    'account_name' => {
        data_type => 'string',
        description => 'The name of the Google Cloud Platform service account associated with the target log collection service. Not required if &#x60;user&#x60; and &#x60;secret_key&#x60; are provided.',

lib/WebService/Fastly/LoggingBigqueryApi.pm  view on Meta::CPAN

# @param string $response_condition The name of an existing condition in the configured endpoint, or leave blank to always execute. (optional)
# @param string $format A Fastly [log format string](https://www.fastly.com/documentation/guides/integrations/streaming-logs/custom-log-formats/). Must produce JSON that matches the schema of your BigQuery table. (optional)
# @param string $log_processing_region The geographic region where the logs will be processed before streaming. Valid values are &#x60;us&#x60;, &#x60;eu&#x60;, and &#x60;none&#x60; for global. (optional, default to 'none')
# @param int $format_version The version of the custom logging format used for the configured endpoint. The logging call gets placed by default in &#x60;vcl_log&#x60; if &#x60;format_version&#x60; is set to &#x60;2&#x60; and in &#x60;vcl_deliver&#x60...
# @param string $user Your Google Cloud Platform service account email address. The &#x60;client_email&#x60; field in your service account authentication JSON. Not required if &#x60;account_name&#x60; is specified. (optional)
# @param string $secret_key Your Google Cloud Platform account secret key. The &#x60;private_key&#x60; field in your service account authentication JSON. Not required if &#x60;account_name&#x60; is specified. (optional)
# @param string $account_name The name of the Google Cloud Platform service account associated with the target log collection service. Not required if &#x60;user&#x60; and &#x60;secret_key&#x60; are provided. (optional)
# @param string $dataset Your BigQuery dataset. (optional)
# @param string $table Your BigQuery table. (optional)
# @param string $template_suffix BigQuery table name suffix template. Optional. (optional)
# @param string $project_id Your Google Cloud Platform project ID. Required (optional)

lib/WebService/Fastly/LoggingBigqueryApi.pm  view on Meta::CPAN

        description => 'Your Google Cloud Platform service account email address. The &#x60;client_email&#x60; field in your service account authentication JSON. Not required if &#x60;account_name&#x60; is specified.',
        required => '0',
    },
    'secret_key' => {
        data_type => 'string',
        description => 'Your Google Cloud Platform account secret key. The &#x60;private_key&#x60; field in your service account authentication JSON. Not required if &#x60;account_name&#x60; is specified.',
        required => '0',
    },
    'account_name' => {
        data_type => 'string',
        description => 'The name of the Google Cloud Platform service account associated with the target log collection service. Not required if &#x60;user&#x60; and &#x60;secret_key&#x60; are provided.',

 view all matches for this distribution


WebService-MyGengo

 view release on metacpan or  search on metacpan

lib/WebService/MyGengo/Client.pm  view on Meta::CPAN

=head1 SYNOPSIS

    use WebService::MyGengo::Client;
    my $client = WebService::MyGengo::Client->new({
        public_key      => 'pubkey'
        , private_key   => 'privkey'
        , use_sandbox   => 1
        });

    # Alternative constructor syntax
    $client = WebService::MyGengo::Client->new('pubkey', 'privkey', $use_sandbox);

lib/WebService/MyGengo/Client.pm  view on Meta::CPAN

    , isa => 'Str'
    , required => 1
    , trigger => sub { shift->clear_request_factory }
    );

=head2 private_key (Str)

Your private API key.

=cut
has private_key => (
    is => 'ro'
    , isa => 'Str'
    , required => 1
    , trigger => sub { shift->clear_request_factory }
    );

lib/WebService/MyGengo/Client.pm  view on Meta::CPAN

sub _build_request_factory {
    my ( $self ) = ( shift );

    return WebService::MyGengo::RequestFactory->new({
        public_key      => $self->public_key
        , private_key   => $self->private_key
        , root_uri      => $self->root_uri
        });
}

=head2 last_response (L<WebService::MyGengo::Response>)

lib/WebService/MyGengo/Client.pm  view on Meta::CPAN

    my ( $orig, $class, $args ) = ( shift, shift, @_ );

    ref($args) eq 'HASH' and return $class->$orig(@_);

    my %args;
    @args{ qw/public_key private_key use_sandbox _user_agent_string/ }
        = @_;

    return \%args;
};

 view all matches for this distribution


WebService-NetSuite

 view release on metacpan or  search on metacpan

lib/WebService/NetSuite.pm  view on Meta::CPAN

has 'debug'           => ( is => 'rw', trigger => \&setDebug );
has 'debugfile'       => ( is => 'rw', trigger => \&setDebugFile,
                           default => 'NetSuite.dbg' );
has 'time'            => ( is => 'rw' );
has 'company'         => ( is => 'ro' );
has 'rsa_private_key' => ( is => 'ro' );
has 'nsemail'         => ( is => 'ro', required => 1 );
has 'nspassword'      => ( is => 'ro', required => 1 );
has 'nsrole'          => ( is => 'ro', writer   => '_set_nsrole' );
has 'nsaccount'       => ( is => 'ro', writer   => '_set_nsaccount' );
has 'nsroleName'      => ( is => 'ro', writer   => '_set_nsroleName' );

lib/WebService/NetSuite.pm  view on Meta::CPAN

sub _generate_auth_token {
    my ( $self, $user_id ) = @_;

    #$DB::single = 1;
    my $rsa_priv =
      Crypt::OpenSSL::RSA->new_private_key( $self->rsa_private_key );
    $rsa_priv->use_pkcs1_padding;

    # number of milliseconds since the epoch
    my $super_epoch = time() * 1000;

 view all matches for this distribution


WebService-TeamCity

 view release on metacpan or  search on metacpan

t/fixtures/testOccurrences/id:711,build:(id:667885).json  view on Meta::CPAN

   },
   "details" : "",
   "duration" : 1,
   "href" : "/httpAuth/app/rest/testOccurrences/id:711,build:(id:667885)",
   "id" : "id:711,build:(id:667885)",
   "name" : "Git Suite: jetbrains.buildServer.buildTriggers.vcs.git.tests.GitUrlSupportTest.should_not_use_private_key_for_local_repository",
   "status" : "SUCCESS",
   "test" : {
      "href" : "/httpAuth/app/rest/tests/id:-1899830473340440401",
      "id" : -1899830473340440401,
      "name" : "Git Suite: jetbrains.buildServer.buildTriggers.vcs.git.tests.GitUrlSupportTest.should_not_use_private_key_for_local_repository"
   }
}

 view all matches for this distribution


WebService-Xero

 view release on metacpan or  search on metacpan

lib/WebService/Xero/Agent/PrivateApplication.pm  view on Meta::CPAN

  return $self->_error('CONSUMER_SECRET not valid')  unless ( $self->{CONSUMER_SECRET} =~ /.{20,}/m ); ## min 20 chars - 30 is typical
   #     KEYFILE 
   #     PRIVATE_KEY
  if ( not defined $self->{pko} and $self->{PRIVATE_KEY} =~ /BEGIN RSA PRIVATE KEY/smg )
  {
    $self->{pko} = Crypt::OpenSSL::RSA->new_private_key(  $self->{PRIVATE_KEY} ) || return $self->_error('PRIVATE_KEY not valid'); 
    ## TODO - sort out catching error - currently crashes if fails not return undef
    ##  could try to catch the error .. eg. RSA.xs:178: OpenSSL error: too long
    ## FROM Crypt::OpenSSL::RSA docs
#       NOTE: Many of the methods in this package can croak, so use eval, or
#       Error.pm's try/catch mechanism to capture errors.  Also, while some

 view all matches for this distribution


Win32-Vcpkg

 view release on metacpan or  search on metacpan

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/debug/html/man3/EC_KEY_dup.html
x64-windows/debug/html/man3/EC_KEY_free.html
x64-windows/debug/html/man3/EC_KEY_generate_key.html
x64-windows/debug/html/man3/EC_KEY_get0_engine.html
x64-windows/debug/html/man3/EC_KEY_get0_group.html
x64-windows/debug/html/man3/EC_KEY_get0_private_key.html
x64-windows/debug/html/man3/EC_KEY_get0_public_key.html
x64-windows/debug/html/man3/EC_KEY_get_conv_form.html
x64-windows/debug/html/man3/EC_KEY_get_enc_flags.html
x64-windows/debug/html/man3/EC_KEY_get_ex_data.html
x64-windows/debug/html/man3/EC_KEY_get_ex_new_index.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/debug/html/man3/EC_KEY_set_enc_flags.html
x64-windows/debug/html/man3/EC_KEY_set_ex_data.html
x64-windows/debug/html/man3/EC_KEY_set_flags.html
x64-windows/debug/html/man3/EC_KEY_set_group.html
x64-windows/debug/html/man3/EC_KEY_set_method.html
x64-windows/debug/html/man3/EC_KEY_set_private_key.html
x64-windows/debug/html/man3/EC_KEY_set_public_key.html
x64-windows/debug/html/man3/EC_KEY_set_public_key_affine_coordinates.html
x64-windows/debug/html/man3/EC_KEY_up_ref.html
x64-windows/debug/html/man3/EC_METHOD_get_field_type.html
x64-windows/debug/html/man3/EC_POINT_add.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/debug/html/man3/ENGINE_get_next.html
x64-windows/debug/html/man3/ENGINE_get_prev.html
x64-windows/debug/html/man3/ENGINE_get_table_flags.html
x64-windows/debug/html/man3/ENGINE_init.html
x64-windows/debug/html/man3/ENGINE_load_builtin_engines.html
x64-windows/debug/html/man3/ENGINE_load_private_key.html
x64-windows/debug/html/man3/ENGINE_load_public_key.html
x64-windows/debug/html/man3/ENGINE_new.html
x64-windows/debug/html/man3/ENGINE_register_DH.html
x64-windows/debug/html/man3/ENGINE_register_DSA.html
x64-windows/debug/html/man3/ENGINE_register_RAND.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/debug/html/man3/EVP_PKEY_get1_DH.html
x64-windows/debug/html/man3/EVP_PKEY_get1_DSA.html
x64-windows/debug/html/man3/EVP_PKEY_get1_EC_KEY.html
x64-windows/debug/html/man3/EVP_PKEY_get1_RSA.html
x64-windows/debug/html/man3/EVP_PKEY_get_default_digest_nid.html
x64-windows/debug/html/man3/EVP_PKEY_get_raw_private_key.html
x64-windows/debug/html/man3/EVP_PKEY_get_raw_public_key.html
x64-windows/debug/html/man3/EVP_PKEY_id.html
x64-windows/debug/html/man3/EVP_PKEY_keygen.html
x64-windows/debug/html/man3/EVP_PKEY_keygen_init.html
x64-windows/debug/html/man3/EVP_PKEY_meth_add0.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/debug/html/man3/EVP_PKEY_meth_set_verifyctx.html
x64-windows/debug/html/man3/EVP_PKEY_missing_parameters.html
x64-windows/debug/html/man3/EVP_PKEY_new.html
x64-windows/debug/html/man3/EVP_PKEY_new_CMAC_key.html
x64-windows/debug/html/man3/EVP_PKEY_new_mac_key.html
x64-windows/debug/html/man3/EVP_PKEY_new_raw_private_key.html
x64-windows/debug/html/man3/EVP_PKEY_new_raw_public_key.html
x64-windows/debug/html/man3/EVP_PKEY_param_check.html
x64-windows/debug/html/man3/EVP_PKEY_paramgen.html
x64-windows/debug/html/man3/EVP_PKEY_paramgen_init.html
x64-windows/debug/html/man3/EVP_PKEY_print_params.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/debug/html/man3/SSL_CTX_add_extra_chain_cert.html
x64-windows/debug/html/man3/SSL_CTX_add_server_custom_ext.html
x64-windows/debug/html/man3/SSL_CTX_add_session.html
x64-windows/debug/html/man3/SSL_CTX_build_cert_chain.html
x64-windows/debug/html/man3/SSL_CTX_callback_ctrl.html
x64-windows/debug/html/man3/SSL_CTX_check_private_key.html
x64-windows/debug/html/man3/SSL_CTX_clear_chain_certs.html
x64-windows/debug/html/man3/SSL_CTX_clear_extra_chain_certs.html
x64-windows/debug/html/man3/SSL_CTX_clear_mode.html
x64-windows/debug/html/man3/SSL_CTX_clear_options.html
x64-windows/debug/html/man3/SSL_CTX_config.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/debug/html/man3/SSL_allow_early_data_cb_fn.html
x64-windows/debug/html/man3/SSL_build_cert_chain.html
x64-windows/debug/html/man3/SSL_bytes_to_cipher_list.html
x64-windows/debug/html/man3/SSL_callback_ctrl.html
x64-windows/debug/html/man3/SSL_check_chain.html
x64-windows/debug/html/man3/SSL_check_private_key.html
x64-windows/debug/html/man3/SSL_clear.html
x64-windows/debug/html/man3/SSL_clear_chain_certs.html
x64-windows/debug/html/man3/SSL_clear_mode.html
x64-windows/debug/html/man3/SSL_clear_options.html
x64-windows/debug/html/man3/SSL_client_hello_cb_fn.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/debug/html/man3/X509_PUBKEY_new.html
x64-windows/debug/html/man3/X509_PUBKEY_set.html
x64-windows/debug/html/man3/X509_PUBKEY_set0_param.html
x64-windows/debug/html/man3/X509_REQ_INFO_free.html
x64-windows/debug/html/man3/X509_REQ_INFO_new.html
x64-windows/debug/html/man3/X509_REQ_check_private_key.html
x64-windows/debug/html/man3/X509_REQ_digest.html
x64-windows/debug/html/man3/X509_REQ_dup.html
x64-windows/debug/html/man3/X509_REQ_free.html
x64-windows/debug/html/man3/X509_REQ_get0_pubkey.html
x64-windows/debug/html/man3/X509_REQ_get0_signature.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/debug/html/man3/X509_check_email.html
x64-windows/debug/html/man3/X509_check_host.html
x64-windows/debug/html/man3/X509_check_ip.html
x64-windows/debug/html/man3/X509_check_ip_asc.html
x64-windows/debug/html/man3/X509_check_issued.html
x64-windows/debug/html/man3/X509_check_private_key.html
x64-windows/debug/html/man3/X509_cmp.html
x64-windows/debug/html/man3/X509_cmp_current_time.html
x64-windows/debug/html/man3/X509_cmp_time.html
x64-windows/debug/html/man3/X509_delete_ext.html
x64-windows/debug/html/man3/X509_digest.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/html/man3/EC_KEY_dup.html
x64-windows/html/man3/EC_KEY_free.html
x64-windows/html/man3/EC_KEY_generate_key.html
x64-windows/html/man3/EC_KEY_get0_engine.html
x64-windows/html/man3/EC_KEY_get0_group.html
x64-windows/html/man3/EC_KEY_get0_private_key.html
x64-windows/html/man3/EC_KEY_get0_public_key.html
x64-windows/html/man3/EC_KEY_get_conv_form.html
x64-windows/html/man3/EC_KEY_get_enc_flags.html
x64-windows/html/man3/EC_KEY_get_ex_data.html
x64-windows/html/man3/EC_KEY_get_ex_new_index.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/html/man3/EC_KEY_set_enc_flags.html
x64-windows/html/man3/EC_KEY_set_ex_data.html
x64-windows/html/man3/EC_KEY_set_flags.html
x64-windows/html/man3/EC_KEY_set_group.html
x64-windows/html/man3/EC_KEY_set_method.html
x64-windows/html/man3/EC_KEY_set_private_key.html
x64-windows/html/man3/EC_KEY_set_public_key.html
x64-windows/html/man3/EC_KEY_set_public_key_affine_coordinates.html
x64-windows/html/man3/EC_KEY_up_ref.html
x64-windows/html/man3/EC_METHOD_get_field_type.html
x64-windows/html/man3/EC_POINT_add.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/html/man3/ENGINE_get_next.html
x64-windows/html/man3/ENGINE_get_prev.html
x64-windows/html/man3/ENGINE_get_table_flags.html
x64-windows/html/man3/ENGINE_init.html
x64-windows/html/man3/ENGINE_load_builtin_engines.html
x64-windows/html/man3/ENGINE_load_private_key.html
x64-windows/html/man3/ENGINE_load_public_key.html
x64-windows/html/man3/ENGINE_new.html
x64-windows/html/man3/ENGINE_register_DH.html
x64-windows/html/man3/ENGINE_register_DSA.html
x64-windows/html/man3/ENGINE_register_RAND.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/html/man3/EVP_PKEY_get1_DH.html
x64-windows/html/man3/EVP_PKEY_get1_DSA.html
x64-windows/html/man3/EVP_PKEY_get1_EC_KEY.html
x64-windows/html/man3/EVP_PKEY_get1_RSA.html
x64-windows/html/man3/EVP_PKEY_get_default_digest_nid.html
x64-windows/html/man3/EVP_PKEY_get_raw_private_key.html
x64-windows/html/man3/EVP_PKEY_get_raw_public_key.html
x64-windows/html/man3/EVP_PKEY_id.html
x64-windows/html/man3/EVP_PKEY_keygen.html
x64-windows/html/man3/EVP_PKEY_keygen_init.html
x64-windows/html/man3/EVP_PKEY_meth_add0.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/html/man3/EVP_PKEY_meth_set_verifyctx.html
x64-windows/html/man3/EVP_PKEY_missing_parameters.html
x64-windows/html/man3/EVP_PKEY_new.html
x64-windows/html/man3/EVP_PKEY_new_CMAC_key.html
x64-windows/html/man3/EVP_PKEY_new_mac_key.html
x64-windows/html/man3/EVP_PKEY_new_raw_private_key.html
x64-windows/html/man3/EVP_PKEY_new_raw_public_key.html
x64-windows/html/man3/EVP_PKEY_param_check.html
x64-windows/html/man3/EVP_PKEY_paramgen.html
x64-windows/html/man3/EVP_PKEY_paramgen_init.html
x64-windows/html/man3/EVP_PKEY_print_params.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/html/man3/SSL_CTX_add_extra_chain_cert.html
x64-windows/html/man3/SSL_CTX_add_server_custom_ext.html
x64-windows/html/man3/SSL_CTX_add_session.html
x64-windows/html/man3/SSL_CTX_build_cert_chain.html
x64-windows/html/man3/SSL_CTX_callback_ctrl.html
x64-windows/html/man3/SSL_CTX_check_private_key.html
x64-windows/html/man3/SSL_CTX_clear_chain_certs.html
x64-windows/html/man3/SSL_CTX_clear_extra_chain_certs.html
x64-windows/html/man3/SSL_CTX_clear_mode.html
x64-windows/html/man3/SSL_CTX_clear_options.html
x64-windows/html/man3/SSL_CTX_config.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/html/man3/SSL_allow_early_data_cb_fn.html
x64-windows/html/man3/SSL_build_cert_chain.html
x64-windows/html/man3/SSL_bytes_to_cipher_list.html
x64-windows/html/man3/SSL_callback_ctrl.html
x64-windows/html/man3/SSL_check_chain.html
x64-windows/html/man3/SSL_check_private_key.html
x64-windows/html/man3/SSL_clear.html
x64-windows/html/man3/SSL_clear_chain_certs.html
x64-windows/html/man3/SSL_clear_mode.html
x64-windows/html/man3/SSL_clear_options.html
x64-windows/html/man3/SSL_client_hello_cb_fn.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/html/man3/X509_PUBKEY_new.html
x64-windows/html/man3/X509_PUBKEY_set.html
x64-windows/html/man3/X509_PUBKEY_set0_param.html
x64-windows/html/man3/X509_REQ_INFO_free.html
x64-windows/html/man3/X509_REQ_INFO_new.html
x64-windows/html/man3/X509_REQ_check_private_key.html
x64-windows/html/man3/X509_REQ_digest.html
x64-windows/html/man3/X509_REQ_dup.html
x64-windows/html/man3/X509_REQ_free.html
x64-windows/html/man3/X509_REQ_get0_pubkey.html
x64-windows/html/man3/X509_REQ_get0_signature.html

corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list  view on Meta::CPAN

x64-windows/html/man3/X509_check_email.html
x64-windows/html/man3/X509_check_host.html
x64-windows/html/man3/X509_check_ip.html
x64-windows/html/man3/X509_check_ip_asc.html
x64-windows/html/man3/X509_check_issued.html
x64-windows/html/man3/X509_check_private_key.html
x64-windows/html/man3/X509_cmp.html
x64-windows/html/man3/X509_cmp_current_time.html
x64-windows/html/man3/X509_cmp_time.html
x64-windows/html/man3/X509_delete_ext.html
x64-windows/html/man3/X509_digest.html

 view all matches for this distribution


Wireguard-WGmeta

 view release on metacpan or  search on metacpan

lib/Wireguard/WGmeta/Parser/Show.pm  view on Meta::CPAN

                'preshared-key' => <interface_preshared_key>,
                'and_so_on'     => <value_of_attr>
            },
            'an_interface_name => {
                'interface'     => <parent_interface>,
                'private-key'   => <interface_private_key>,
                'and_so_on'     => <value_of_attr>
            }
        },
        'an_other_interface' => {
            [...]

 view all matches for this distribution


XML-Compile-WSS-Signature

 view release on metacpan or  search on metacpan

lib/XML/Compile/WSS/Sign/RSA.pm  view on Meta::CPAN

sub init($)
{   my ($self, $args) = @_;
    $self->SUPER::init($args);

    $self->privateKey
      ( $args->{private_key}
      , hashing => $args->{hashing}
      , padding => $args->{padding}
      );
 
    $self->publicKey

lib/XML/Compile/WSS/Sign/RSA.pm  view on Meta::CPAN



sub toPrivateSHA($)
{   my ($self, $priv) = @_;

    return ($priv->get_private_key_string, $priv)
        if blessed $priv && $priv->isa('Crypt::OpenSSL::RSA');

    error __x"unsupported private key object `{object}'", object=>$priv
       if ref $priv =~ m/Crypt/;

    return ($priv, Crypt::OpenSSL::RSA->new_private_key($priv))
        if index($priv, "\n") >= 0;

    my $key = read_file $priv;
    my $rsa = eval { Crypt::OpenSSL::RSA->new_private_key($key) };
    if($@)
    {   error __x"cannot read private RSA key from {file}: {err}"
          , file => $priv, err => $@;
    }

lib/XML/Compile/WSS/Sign/RSA.pm  view on Meta::CPAN

# Do we need next 4?  Probably not

sub sign(@)
{   my ($self, $text) = @_;
    my $priv = $self->privateKeyRSA
        or error "signing rsa requires the private_key";

    $priv->sign($text);
}

sub encrypt(@)

lib/XML/Compile/WSS/Sign/RSA.pm  view on Meta::CPAN

}

sub decrypt(@)
{   my ($self, $text) = @_;
    my $priv = $self->privateKeyRSA
        or error "decrypting rsa requires the private_key";
    $priv->decrypt($text);
}


#XXX Unused?  See checker()

lib/XML/Compile/WSS/Sign/RSA.pm  view on Meta::CPAN

### above functions probably not needed.

sub builder()
{   my ($self) = @_;
    my $priv   = $self->privateKeyRSA
        or error "signing rsa requires the private_key";

    sub { $priv->sign($_[0]) };
}

sub checker()

 view all matches for this distribution


XML-Enc

 view release on metacpan or  search on metacpan

lib/XML/Enc.pm  view on Meta::CPAN

        require Crypt::OpenSSL::X509;
    };
    confess "Crypt::OpenSSL::X509 needs to be installed so that we
            can handle X509 Certificates." if $@;

    my $x509Key = Crypt::OpenSSL::X509->new_private_key( $key_text );

    if ( $x509Key ) {
        $x509Key->use_pkcs1_padding();
        $self->{ key_obj } = $x509Key;
        $self->{key_type} = 'x509';

 view all matches for this distribution


XML-Sig-OO

 view release on metacpan or  search on metacpan

exaples/sign_multi_keys.pl  view on Meta::CPAN


my $x=$s->build_xpath;

# sign our first xml chunk with our rsa key!
my $rsa_str=join '',IO::File->new(File::Spec->catfile($Bin,'x509_key.pem'))->getlines;
my $rsa=Crypt::OpenSSL::RSA->new_private_key($rsa_str);
$rsa->use_pkcs1_padding();
my $cert_str=join '',IO::File->new(File::Spec->catfile($Bin,'x509_cert.pem'))->getlines;
$s->sign_cert($rsa);
$s->key_type('rsa');
$s->cert_string($cert_str);

 view all matches for this distribution


XML-Sig

 view release on metacpan or  search on metacpan

lib/XML/Sig.pm  view on Meta::CPAN

        require Crypt::OpenSSL::X509;
    };
    confess "Crypt::OpenSSL::X509 needs to be installed so that we
            can handle X509 Certificates." if $@;

    my $x509Key = Crypt::OpenSSL::X509->new_private_key( $key_text );

    if ( $x509Key ) {
        $x509Key->use_pkcs1_oaep_padding();
        $self->{ key_obj } = $x509Key;
        $self->{key_type} = 'x509';

 view all matches for this distribution


XS-libunievent

 view release on metacpan or  search on metacpan

libunievent/src/panda/unievent/ssl/SslFilter.cc  view on Meta::CPAN


SslFilter::SslFilter (Stream* stream, const SslContext &context, const SslFilterSP& server_filter)
        : StreamFilter(stream, TYPE, PRIORITY), state(State::initial), profile(Profile::UNKNOWN), server_filter(server_filter)
{
    panda_log_ctor();
    if (stream->listening() && !SSL_CTX_check_private_key(context)) throw Error("SSL certificate&key needed to listen()");
    #ifdef RENEGOTIATION_DISABLED
        SSL_CTX_set_options(context, SSL_OP_NO_RENEGOTIATION);
    #endif
    init(context);
}

libunievent/src/panda/unievent/ssl/SslFilter.cc  view on Meta::CPAN

    SSL_set_bio(raw_ssl, read_bio, write_bio);
    ssl = raw_ssl;
}

void SslFilter::listen () {
    if (!SSL_check_private_key(ssl)) throw Error("SSL certificate&key needed to listen()");
    NextFilter::listen();
}

void SslFilter::reset () {
    if (state == State::initial) return;

 view all matches for this distribution


ZMQ-Raw

 view release on metacpan or  search on metacpan

xs/Curve.xs  view on Meta::CPAN

keypair (class)
	SV *class

	PREINIT:
		int rc, ctx;
		SV *public_key, *private_key;

	PPCODE:
		ctx = GIMME_V;

		if (ctx == G_VOID)
			XSRETURN_EMPTY;

		public_key = sv_2mortal (newSV (41));
		private_key = sv_2mortal (newSV (41));
		SvPOK_on (public_key);
		SvPOK_on (private_key);
		SvCUR_set (public_key, 40);
		SvCUR_set (private_key, 40);

		rc = zmq_curve_keypair (SvPVX (public_key), SvPVX (private_key));
		zmq_raw_check_error (rc);

		XPUSHs (private_key);
		if (ctx == G_ARRAY)
		{
			XPUSHs (public_key);
			XSRETURN (2);
		}

		XSRETURN (1);

SV *
public (class, private_key)
	SV *class
	SV *private_key

	PREINIT:
		int rc;
		SV *public_key;

	CODE:
		if (SvCUR (private_key) != 40)
			croak_usage ("private_key should be 40 bytes");

		public_key = sv_2mortal (newSV (41));
		SvPOK_on (public_key);
		SvCUR_set (public_key, 40);

		rc = zmq_curve_public (SvPVX (public_key), SvPVX (private_key));
		zmq_raw_check_error (rc);

		SvREFCNT_inc (public_key);
		RETVAL = public_key;

 view all matches for this distribution


Zonemaster-LDNS

 view release on metacpan or  search on metacpan

ldns/host2str.c  view on Meta::CPAN

                                status=ldns_algorithm2buffer_str(output, (ldns_algorithm)ldns_key_algorithm(k));
#ifndef S_SPLINT_S
				ldns_buffer_printf(output, ")\n");
                                if(k->_key.key) {
                                        EC_KEY* ec = EVP_PKEY_get1_EC_KEY(k->_key.key);
                                        const BIGNUM* b = EC_KEY_get0_private_key(ec);
					if(!ldns_print_bignum_b64_line(output, "PrivateKey", b))
						goto error;
                                        /* down reference count in EC_KEY
                                         * its still assigned to the PKEY */
                                        EC_KEY_free(ec);

 view all matches for this distribution


Zoom-Meeting

 view release on metacpan or  search on metacpan

local/lib/perl5/x86_64-linux-thread/Net/SSLeay.pm  view on Meta::CPAN

    NID_pkcs9_extCertAttributes
    NID_pkcs9_messageDigest
    NID_pkcs9_signingTime
    NID_pkcs9_unstructuredAddress
    NID_pkcs9_unstructuredName
    NID_private_key_usage_period
    NID_rc2_40_cbc
    NID_rc2_64_cbc
    NID_rc2_cbc
    NID_rc2_cfb64
    NID_rc2_ecb

 view all matches for this distribution


grpc-xs

 view release on metacpan or  search on metacpan

ext/channel_credentials.xs  view on Meta::CPAN

    if ( items % 2 ) {
      croak("Expecting a hash as input to channel credentials constructor");
    }

    // @param string pem_root_certs PEM encoding of the server root certificates
    // @param string pem_private_key PEM encoding of the client's private key
    //     (optional)
    // @param string pem_cert_chain PEM encoding of the client's certificate chain
    //     (optional)
    // @return ChannelCredentials The new SSL credentials object

    const char* pem_root_certs = NULL;

    grpc_ssl_pem_key_cert_pair pem_key_cert_pair;
    pem_key_cert_pair.private_key = pem_key_cert_pair.cert_chain = NULL;

    int i;
    for (i = 0; i < items; i += 2 ) {
      const char *key = SvPV_nolen(ST(i));
      if (!strcmp( key, "pem_root_certs")) {
        if (SvOK(ST(i+1)))
          pem_root_certs = SvPV_nolen(ST(i+1));
      } else if (!strcmp( key, "pem_private_key")) {
        if (SvOK(ST(i+1)))
          pem_key_cert_pair.private_key = SvPV_nolen(ST(i+1));
      } else if (!strcmp( key, "pem_cert_chain")) {
        if (SvOK(ST(i+1)))
          pem_key_cert_pair.cert_chain = SvPV_nolen(ST(i+1));
      }
    }

    ctx->wrapped = grpc_ssl_credentials_create(
        pem_root_certs,
        pem_key_cert_pair.private_key == NULL ? NULL : &pem_key_cert_pair, NULL
#ifdef GRPC_SSL_CREDENTIALS_HAS_4_ARGS
        , NULL
#endif
    );

 view all matches for this distribution


jQuery-File-Upload-Imager

 view release on metacpan or  search on metacpan

lib/jQuery/File/Upload/Imager.pm  view on Meta::CPAN

		$_->{thumbnail_upload_dir} = $_->{upload_dir} if $_->{thumbnail_upload_dir} eq '';

		my $path = $_->{upload_dir} . '/' . $self->filename;
		my $thumb_path = $_->{thumbnail_upload_dir} . '/' . $self->thumbnail_filename;

		if(($_->{user} ne '' and $_->{public_key} ne '' and $_->{private_key} ne '') or ($_->{user} ne '' and $_->{password} ne '')) {
			my $ssh2 = $self->_auth_user($_);

			#if it is an image, scp both file and thumbnail
			if($self->is_image) {
				$ssh2->scp_put($self->{tmp_file_path}, $path);

lib/jQuery/File/Upload/Imager.pm  view on Meta::CPAN

	my $ssh2 = Net::SSH2->new;

	$ssh2->connect($auth->{host}) or die $!;

	#authenticate
	if($auth->{user} ne '' and $auth->{public_key} ne '' and $auth->{private_key} ne '') {
		$ssh2->auth_publickey($auth->{user},$auth->{public_key},$auth->{private_key});
	}
	else {
		$ssh2->auth_password($auth->{user},$auth->{password});
	}

lib/jQuery/File/Upload/Imager.pm  view on Meta::CPAN


  my $j_fu = jQuery::File::Upload::Imager->new(
		scp => [{
			user => 'user', #remote user
			public_key => '/home/user/.ssh/id_rsa.pub',	#also possible to use password instead of keys
			private_key => '/home/user/.ssh/id_rsa',
			host => 'mydomain.com',
			upload_dir => '/var/www/html/files', #directory that files will be uploaded to
		}],

		#user validation specifications

lib/jQuery/File/Upload/Imager.pm  view on Meta::CPAN


  $j_fu->scp([{
			host => 'media.mydomain.com',
			user => 'user',
		  	public_key => '/home/user/.ssh/id_rsa.pub',
		  	private_key => '/home/user/.ssh/id_rsa',
			password => 'pass', #if keys are present, you do not need password
			upload_dir => '/my/remote/dir',
		}]);

This method takes in an arrayref of hashrefs, where each hashref is a remote host you would like to SCP the files to.

lib/jQuery/File/Upload/Imager.pm  view on Meta::CPAN


user (REQUIRED) - used to identify the user to remote server

=item

public_key & private_key - used to make secure connection. Not needed if password is given.

=item

password - used along with user to authenticate with remote server. Not needed if keys are supplied.

 view all matches for this distribution


jQuery-File-Upload

 view release on metacpan or  search on metacpan

lib/jQuery/File/Upload.pm  view on Meta::CPAN

		$_->{thumbnail_upload_dir} = $_->{upload_dir} if $_->{thumbnail_upload_dir} eq '';

		my $path = $_->{upload_dir} . '/' . $self->filename;
		my $thumb_path = $_->{thumbnail_upload_dir} . '/' . $self->thumbnail_filename;

		if(($_->{user} ne '' and $_->{public_key} ne '' and $_->{private_key} ne '') or ($_->{user} ne '' and $_->{password} ne '')) {
			my $ssh2 = $self->_auth_user($_);

			#if it is an image, scp both file and thumbnail
			if($self->is_image) {
				$ssh2->scp_put($self->{tmp_file_path}, $path);

lib/jQuery/File/Upload.pm  view on Meta::CPAN

	my $ssh2 = Net::SSH2->new;

	$ssh2->connect($auth->{host}) or die $!;

	#authenticate
	if($auth->{user} ne '' and $auth->{public_key} ne '' and $auth->{private_key} ne '') {
		$ssh2->auth_publickey($auth->{user},$auth->{public_key},$auth->{private_key});
	}
	else {
		$ssh2->auth_password($auth->{user},$auth->{password});
	}

lib/jQuery/File/Upload.pm  view on Meta::CPAN


  my $j_fu = jQuery::File::Upload->new(
		scp => [{
			user => 'user', #remote user
			public_key => '/home/user/.ssh/id_rsa.pub',	#also possible to use password instead of keys
			private_key => '/home/user/.ssh/id_rsa',
			host => 'mydomain.com',
			upload_dir => '/var/www/html/files', #directory that files will be uploaded to
		}],

		#user validation specifications

lib/jQuery/File/Upload.pm  view on Meta::CPAN


  $j_fu->scp([{
			host => 'media.mydomain.com',
			user => 'user',
		  	public_key => '/home/user/.ssh/id_rsa.pub',
		  	private_key => '/home/user/.ssh/id_rsa',
			password => 'pass', #if keys are present, you do not need password
			upload_dir => '/my/remote/dir',
		}]);

This method takes in an arrayref of hashrefs, where each hashref is a remote host you would like to SCP the files to.

lib/jQuery/File/Upload.pm  view on Meta::CPAN


user (REQUIRED) - used to identify the user to remote server

=item

public_key & private_key - used to make secure connection. Not needed if password is given.

=item

password - used along with user to authenticate with remote server. Not needed if keys are supplied.

 view all matches for this distribution


mod_perl

 view release on metacpan or  search on metacpan

Apache-Test/lib/Apache/TestSSLCA.pm  view on Meta::CPAN

database         = $db          # database index file.
serial           = serial       # The current serial number

certificate      = $cacert      # The CA certificate
crl              = $cacrl       # The current CRL
private_key      = $cakey       # The private key

default_days     = 365          # how long to certify for
default_crl_days = 365          # how long before next CRL
default_md       = $dgst        # which md to use.
preserve         = no           # keep passed DN ordering

 view all matches for this distribution


oxdperl

 view release on metacpan or  search on metacpan

lib/OxdPackages/GetClientToken.pm  view on Meta::CPAN

    #
    #	string $op_discovery_path - (Optional) Path to discovery document
    #
    #	array $scope - (Optional) Scope
    #
    #	string $authentication_method - (Optional) If value is missed then basic authentication is used. Otherwise it's possible to set `private_key_jwt` value for Private Key authentication.
    #
    #	string $algorithm - (Optional) Required if authentication_method=private_key_jwt. Valid values are none, HS256, HS384, HS512, RS256, RS384, RS512, ES256, ES384, ES512
    #
    #	string $key_id - (Optional) Required if authentication_method=private_key_jwt. It has to be valid key id from key store.
    #
    # Returns:
    #	void
    #
    # This module uses `getResponseObject` method of OxdClient module for getting response from oxd.

 view all matches for this distribution


zxid

 view release on metacpan or  search on metacpan

call-anal.pl  view on Meta::CPAN

       zx_strf zx_ref_str zx_ref_len_str zx_dup_str zx_dup_len_str zx_dup_cstr
       zx_new_len_str zx_str_to_c
       zx_ref_attr zx_ref_len_attr zx_attrf zx_dup_attr zx_dup_len_attr
       zx_new_str_elem zx_ref_elem zx_ref_len_elem
       zx_url_encode zx_url_encode_len zx_url_encode_raw unbase64_raw
       zx_rand zx_report_openssl_err zx_memmem zxid_mk_self_sig_cert zxid_extract_private_key );

push @ignore_callee,
    qw(hi_pdu_alloc hi_dump nonblock setkernelbufsizes zxid_get_ent_ss zx_pw_authn
       xmtp_decode_resp test_ping http_decode smtp_decode_req smtp_decode_resp );

 view all matches for this distribution


( run in 2.235 seconds using v1.01-cache-2.11-cpan-39bf76dae61 )