view release on metacpan or search on metacpan
ldns/host2str.c view on Meta::CPAN
status=ldns_algorithm2buffer_str(output, (ldns_algorithm)ldns_key_algorithm(k));
#ifndef S_SPLINT_S
ldns_buffer_printf(output, ")\n");
if(k->_key.key) {
EC_KEY* ec = EVP_PKEY_get1_EC_KEY(k->_key.key);
const BIGNUM* b = EC_KEY_get0_private_key(ec);
if(!ldns_print_bignum_b64_line(output, "PrivateKey", b))
goto error;
/* down reference count in EC_KEY
* its still assigned to the PKEY */
EC_KEY_free(ec);
view all matches for this distribution
view release on metacpan or search on metacpan
local/lib/perl5/x86_64-linux-thread/Net/SSLeay.pm view on Meta::CPAN
NID_pkcs9_extCertAttributes
NID_pkcs9_messageDigest
NID_pkcs9_signingTime
NID_pkcs9_unstructuredAddress
NID_pkcs9_unstructuredName
NID_private_key_usage_period
NID_rc2_40_cbc
NID_rc2_64_cbc
NID_rc2_cbc
NID_rc2_cfb64
NID_rc2_ecb
view all matches for this distribution
view release on metacpan or search on metacpan
ext/channel_credentials.xs view on Meta::CPAN
if ( items % 2 ) {
croak("Expecting a hash as input to channel credentials constructor");
}
// @param string pem_root_certs PEM encoding of the server root certificates
// @param string pem_private_key PEM encoding of the client's private key
// (optional)
// @param string pem_cert_chain PEM encoding of the client's certificate chain
// (optional)
// @return ChannelCredentials The new SSL credentials object
const char* pem_root_certs = NULL;
grpc_ssl_pem_key_cert_pair pem_key_cert_pair;
pem_key_cert_pair.private_key = pem_key_cert_pair.cert_chain = NULL;
int i;
for (i = 0; i < items; i += 2 ) {
const char *key = SvPV_nolen(ST(i));
if (!strcmp( key, "pem_root_certs")) {
if (SvOK(ST(i+1)))
pem_root_certs = SvPV_nolen(ST(i+1));
} else if (!strcmp( key, "pem_private_key")) {
if (SvOK(ST(i+1)))
pem_key_cert_pair.private_key = SvPV_nolen(ST(i+1));
} else if (!strcmp( key, "pem_cert_chain")) {
if (SvOK(ST(i+1)))
pem_key_cert_pair.cert_chain = SvPV_nolen(ST(i+1));
}
}
ctx->wrapped = grpc_ssl_credentials_create(
pem_root_certs,
pem_key_cert_pair.private_key == NULL ? NULL : &pem_key_cert_pair, NULL
#ifdef GRPC_SSL_CREDENTIALS_HAS_4_ARGS
, NULL
#endif
);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/jQuery/File/Upload/Imager.pm view on Meta::CPAN
$_->{thumbnail_upload_dir} = $_->{upload_dir} if $_->{thumbnail_upload_dir} eq '';
my $path = $_->{upload_dir} . '/' . $self->filename;
my $thumb_path = $_->{thumbnail_upload_dir} . '/' . $self->thumbnail_filename;
if(($_->{user} ne '' and $_->{public_key} ne '' and $_->{private_key} ne '') or ($_->{user} ne '' and $_->{password} ne '')) {
my $ssh2 = $self->_auth_user($_);
#if it is an image, scp both file and thumbnail
if($self->is_image) {
$ssh2->scp_put($self->{tmp_file_path}, $path);
lib/jQuery/File/Upload/Imager.pm view on Meta::CPAN
my $ssh2 = Net::SSH2->new;
$ssh2->connect($auth->{host}) or die $!;
#authenticate
if($auth->{user} ne '' and $auth->{public_key} ne '' and $auth->{private_key} ne '') {
$ssh2->auth_publickey($auth->{user},$auth->{public_key},$auth->{private_key});
}
else {
$ssh2->auth_password($auth->{user},$auth->{password});
}
lib/jQuery/File/Upload/Imager.pm view on Meta::CPAN
my $j_fu = jQuery::File::Upload::Imager->new(
scp => [{
user => 'user', #remote user
public_key => '/home/user/.ssh/id_rsa.pub', #also possible to use password instead of keys
private_key => '/home/user/.ssh/id_rsa',
host => 'mydomain.com',
upload_dir => '/var/www/html/files', #directory that files will be uploaded to
}],
#user validation specifications
lib/jQuery/File/Upload/Imager.pm view on Meta::CPAN
$j_fu->scp([{
host => 'media.mydomain.com',
user => 'user',
public_key => '/home/user/.ssh/id_rsa.pub',
private_key => '/home/user/.ssh/id_rsa',
password => 'pass', #if keys are present, you do not need password
upload_dir => '/my/remote/dir',
}]);
This method takes in an arrayref of hashrefs, where each hashref is a remote host you would like to SCP the files to.
lib/jQuery/File/Upload/Imager.pm view on Meta::CPAN
user (REQUIRED) - used to identify the user to remote server
=item
public_key & private_key - used to make secure connection. Not needed if password is given.
=item
password - used along with user to authenticate with remote server. Not needed if keys are supplied.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/jQuery/File/Upload.pm view on Meta::CPAN
$_->{thumbnail_upload_dir} = $_->{upload_dir} if $_->{thumbnail_upload_dir} eq '';
my $path = $_->{upload_dir} . '/' . $self->filename;
my $thumb_path = $_->{thumbnail_upload_dir} . '/' . $self->thumbnail_filename;
if(($_->{user} ne '' and $_->{public_key} ne '' and $_->{private_key} ne '') or ($_->{user} ne '' and $_->{password} ne '')) {
my $ssh2 = $self->_auth_user($_);
#if it is an image, scp both file and thumbnail
if($self->is_image) {
$ssh2->scp_put($self->{tmp_file_path}, $path);
lib/jQuery/File/Upload.pm view on Meta::CPAN
my $ssh2 = Net::SSH2->new;
$ssh2->connect($auth->{host}) or die $!;
#authenticate
if($auth->{user} ne '' and $auth->{public_key} ne '' and $auth->{private_key} ne '') {
$ssh2->auth_publickey($auth->{user},$auth->{public_key},$auth->{private_key});
}
else {
$ssh2->auth_password($auth->{user},$auth->{password});
}
lib/jQuery/File/Upload.pm view on Meta::CPAN
my $j_fu = jQuery::File::Upload->new(
scp => [{
user => 'user', #remote user
public_key => '/home/user/.ssh/id_rsa.pub', #also possible to use password instead of keys
private_key => '/home/user/.ssh/id_rsa',
host => 'mydomain.com',
upload_dir => '/var/www/html/files', #directory that files will be uploaded to
}],
#user validation specifications
lib/jQuery/File/Upload.pm view on Meta::CPAN
$j_fu->scp([{
host => 'media.mydomain.com',
user => 'user',
public_key => '/home/user/.ssh/id_rsa.pub',
private_key => '/home/user/.ssh/id_rsa',
password => 'pass', #if keys are present, you do not need password
upload_dir => '/my/remote/dir',
}]);
This method takes in an arrayref of hashrefs, where each hashref is a remote host you would like to SCP the files to.
lib/jQuery/File/Upload.pm view on Meta::CPAN
user (REQUIRED) - used to identify the user to remote server
=item
public_key & private_key - used to make secure connection. Not needed if password is given.
=item
password - used along with user to authenticate with remote server. Not needed if keys are supplied.
view all matches for this distribution
view release on metacpan or search on metacpan
Apache-Test/lib/Apache/TestSSLCA.pm view on Meta::CPAN
database = $db # database index file.
serial = serial # The current serial number
certificate = $cacert # The CA certificate
crl = $cacrl # The current CRL
private_key = $cakey # The private key
default_days = 365 # how long to certify for
default_crl_days = 365 # how long before next CRL
default_md = $dgst # which md to use.
preserve = no # keep passed DN ordering
view all matches for this distribution
view release on metacpan or search on metacpan
lib/OxdPackages/GetClientToken.pm view on Meta::CPAN
#
# string $op_discovery_path - (Optional) Path to discovery document
#
# array $scope - (Optional) Scope
#
# string $authentication_method - (Optional) If value is missed then basic authentication is used. Otherwise it's possible to set `private_key_jwt` value for Private Key authentication.
#
# string $algorithm - (Optional) Required if authentication_method=private_key_jwt. Valid values are none, HS256, HS384, HS512, RS256, RS384, RS512, ES256, ES384, ES512
#
# string $key_id - (Optional) Required if authentication_method=private_key_jwt. It has to be valid key id from key store.
#
# Returns:
# void
#
# This module uses `getResponseObject` method of OxdClient module for getting response from oxd.
view all matches for this distribution
view release on metacpan or search on metacpan
call-anal.pl view on Meta::CPAN
zx_strf zx_ref_str zx_ref_len_str zx_dup_str zx_dup_len_str zx_dup_cstr
zx_new_len_str zx_str_to_c
zx_ref_attr zx_ref_len_attr zx_attrf zx_dup_attr zx_dup_len_attr
zx_new_str_elem zx_ref_elem zx_ref_len_elem
zx_url_encode zx_url_encode_len zx_url_encode_raw unbase64_raw
zx_rand zx_report_openssl_err zx_memmem zxid_mk_self_sig_cert zxid_extract_private_key );
push @ignore_callee,
qw(hi_pdu_alloc hi_dump nonblock setkernelbufsizes zxid_get_ent_ss zx_pw_authn
xmtp_decode_resp test_ping http_decode smtp_decode_req smtp_decode_resp );
view all matches for this distribution