view release on metacpan or search on metacpan
lib/WWW/Suffit/Server.pm view on Meta::CPAN
no_daemonize => 1,
# Security
mysecret => 'Eph9Ce$quo.p2@oW3',
rsa_keysize => 2048,
private_key => undef, # Auto
public_key => undef, # Auto
# Initialization options
all_features => 'no',
config_opts => {
lib/WWW/Suffit/Server.pm view on Meta::CPAN
The project name. For example: MyApp
Default: current class name
=head2 private_key
private_key => '...'
Private RSA key
=head2 project_version
lib/WWW/Suffit/Server.pm view on Meta::CPAN
my %keysdata = $app->gen_rsakeys;
my %keysdata = $app->gen_rsakeys( 2048 );
This helper generates RSA keys pair and returns structure as hash:
private_key => '...',
public_key => '...',
key_size => 2048,
error => '...',
=head2 jwt
lib/WWW/Suffit/Server.pm view on Meta::CPAN
has 'loglevel' => 'warn'; # warn
has 'max_history_size' => MAX_HISTORY_SIZE;
# Security
has 'mysecret' => DEFAULT_SECRET; # Secret
has 'private_key' => ''; # Private RSA key
has 'public_key' => ''; # Public RSA key
has 'rsa_keysize' => sub { shift->conf->latest("/rsa_keysize") };
has 'trustedproxies' => sub { [grep {length} @{(shift->conf->list("/trustedproxy"))}] };
# Prefork
lib/WWW/Suffit/Server.pm view on Meta::CPAN
$self->mysecret($self->conf->latest("/secret")) if $self->conf->latest("/secret");
$self->secrets([$self->mysecret]);
# Init RSA keys (optional)
if ($all_features || is_true_flag($opts->{init_rsa_keys} // $self->init_rsa_keys)) {
my $private_key_file = $self->conf->latest("/privatekeyfile") || path($self->datadir, PRIVATEKEYFILE)->to_string;
my $public_key_file = $self->conf->latest("/publickeyfile") || path($self->datadir, PUBLICKEYFILE)->to_string;
if ((!-r $private_key_file) and (!-r $public_key_file)) {
my $rsa = WWW::Suffit::RSA->new();
$rsa->key_size($self->rsa_keysize) if $self->rsa_keysize;
$rsa->keygen;
path($private_key_file)->spew($rsa->private_key)->chmod(0600);
$self->private_key($rsa->private_key);
path($public_key_file)->spew($rsa->public_key)->chmod(0644);
$self->public_key($rsa->public_key);
} elsif (!-r $private_key_file) {
$self->raise("Can't read RSA private key file: \"%s\"", $private_key_file);
} elsif (!-r $public_key_file) {
$self->raise("Can't read RSA public key file: \"%s\"", $public_key_file);
} else {
$self->private_key(path($private_key_file)->slurp);
$self->public_key(path($public_key_file)->slurp)
}
}
# Init AuthDB plugin (optional)
lib/WWW/Suffit/Server.pm view on Meta::CPAN
}
sub _getJWT {
my $self = shift;
return WWW::Suffit::JWT->new(
secret => $self->app->mysecret,
private_key => $self->app->private_key,
public_key => $self->app->public_key,
);
}
sub _genCacheKey {
my $self = shift;
lib/WWW/Suffit/Server.pm view on Meta::CPAN
my $self = shift;
my $key_size = shift || $self->app->rsa_keysize;
my $rsa = WWW::Suffit::RSA->new();
$rsa->key_size($key_size) if $key_size;
$rsa->keygen;
my ($private_key, $public_key) = ($rsa->private_key // '', $rsa->public_key // '');
return (
private_key => $private_key,
public_key => $public_key,
key_size => $rsa->key_size,
error => $rsa->error
? sprintf("Error occurred while generation %s bit RSA keys: %s", $rsa->key_size // '?', $rsa->error)
: '',
view all matches for this distribution
view release on metacpan or search on metacpan
lib/WWW/Suffit/UserAgent.pm view on Meta::CPAN
my $url_str = $client->path2url("/foo/bar", 1);
# http://localhost:8695/foo/bar
Sets path to url
=head2 private_key
$clinet = $clinet->private_key("---- BEGIN ... END -----");
my $private_key = $client->private_key;
Sets or returns RSA private key
=head2 public_key
lib/WWW/Suffit/UserAgent.pm view on Meta::CPAN
$args{token} //= "";
$args{token_name} ||= TOKEN_HEADER_NAME;
# Security
$args{public_key} //= "";
$args{private_key} //= "";
# Proxy string
$args{proxy} //= "";
# Transaction (tx)
lib/WWW/Suffit/UserAgent.pm view on Meta::CPAN
$self->{public_key} = $k;
return $self;
}
return $self->{public_key};
}
sub private_key {
my $self = shift;
my $k = shift;
if (defined $k) {
$self->{private_key} = $k;
return $self;
}
return $self->{private_key};
}
sub proxy {
my $self = shift;
my $p = shift;
return $self->{proxy} unless defined $p;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Weather/WeatherKit.pm view on Meta::CPAN
my $wk = Weather::WeatherKit->new(
team_id => $apple_team_id, # Apple Developer Team Id
service_id => $weatherkit_service_id, # WeatherKit Service Id
key_id => $key_id, # WeatherKit developer key ID
key => $private_key # Encrypted private key (PEM)
);
# Request current weather:
my $report = $wk->get(
lat => $lat, # Latitude
lib/Weather/WeatherKit.pm view on Meta::CPAN
my $wk = Weather::WeatherKit->new(
team_id => "MLU84X58U4",
service_id => "com.domain.myweatherapp",
key_id => $key_id,
key => $private_key?,
key_file => $private_key_pem?,
language => $lang_code?,
timeout => $timeout_sec?,
expiration => $expire_secs?,
ua => $lwp_ua?,
curl => $use_curl?
view all matches for this distribution
view release on metacpan or search on metacpan
lib/WebService/Braintree.pm view on Meta::CPAN
my $conf = WebService::Braintree->configuration;
$conf->environment( 'sandbox' );
$conf->merchant_id( 'use_your_merchant_id' );
$conf->public_key( 'use_your_public_key' );
$conf->private_key( 'use_your_private_key' );
my $result = WebService::Braintree::Transaction->sale(
...
);
lib/WebService/Braintree.pm view on Meta::CPAN
my $gateway = WebService::Braintree::Gateway->new({
environment => 'sandbox',
merchant_id => 'use_your_merchant_id',
public_key => 'use_your_public_key',
private_key => 'use_your_private_key',
});
my $result = $gateway->transaction->sale(
...
);
lib/WebService/Braintree.pm view on Meta::CPAN
be:
{
"merchant_id": "<< value 1 >>",
"public_key": "<< value 2 >>",
"private_key": "<< value 3 >>"
}
replacing what's in the double-quotes with the appropriate values from your
Braintree sandbox's dashboard.
view all matches for this distribution
view release on metacpan or search on metacpan
examples/api.pl view on Meta::CPAN
use WebService::Cryptsy;
use lib qw(lib ../lib);
my $cryp = WebService::Cryptsy->new(
public_key => 'YOUR PUBLIC KEY',
private_key => 'YOUR PRIVATE KEY',
);
my $market_data = $cryp->marketdatav2
or die "Error fetching data: " . $cryp->error;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/WebService/Fastly/LoggingBigqueryApi.pm view on Meta::CPAN
# @param string $response_condition The name of an existing condition in the configured endpoint, or leave blank to always execute. (optional)
# @param string $format A Fastly [log format string](https://www.fastly.com/documentation/guides/integrations/streaming-logs/custom-log-formats/). Must produce JSON that matches the schema of your BigQuery table. (optional)
# @param string $log_processing_region The geographic region where the logs will be processed before streaming. Valid values are `us`, `eu`, and `none` for global. (optional, default to 'none')
# @param int $format_version The version of the custom logging format used for the configured endpoint. The logging call gets placed by default in `vcl_log` if `format_version` is set to `2` and in `vcl_deliver`...
# @param string $user Your Google Cloud Platform service account email address. The `client_email` field in your service account authentication JSON. Not required if `account_name` is specified. (optional)
# @param string $secret_key Your Google Cloud Platform account secret key. The `private_key` field in your service account authentication JSON. Not required if `account_name` is specified. (optional)
# @param string $account_name The name of the Google Cloud Platform service account associated with the target log collection service. Not required if `user` and `secret_key` are provided. (optional)
# @param string $dataset Your BigQuery dataset. (optional)
# @param string $table Your BigQuery table. (optional)
# @param string $template_suffix BigQuery table name suffix template. Optional. (optional)
# @param string $project_id Your Google Cloud Platform project ID. Required (optional)
lib/WebService/Fastly/LoggingBigqueryApi.pm view on Meta::CPAN
description => 'Your Google Cloud Platform service account email address. The `client_email` field in your service account authentication JSON. Not required if `account_name` is specified.',
required => '0',
},
'secret_key' => {
data_type => 'string',
description => 'Your Google Cloud Platform account secret key. The `private_key` field in your service account authentication JSON. Not required if `account_name` is specified.',
required => '0',
},
'account_name' => {
data_type => 'string',
description => 'The name of the Google Cloud Platform service account associated with the target log collection service. Not required if `user` and `secret_key` are provided.',
lib/WebService/Fastly/LoggingBigqueryApi.pm view on Meta::CPAN
# @param string $response_condition The name of an existing condition in the configured endpoint, or leave blank to always execute. (optional)
# @param string $format A Fastly [log format string](https://www.fastly.com/documentation/guides/integrations/streaming-logs/custom-log-formats/). Must produce JSON that matches the schema of your BigQuery table. (optional)
# @param string $log_processing_region The geographic region where the logs will be processed before streaming. Valid values are `us`, `eu`, and `none` for global. (optional, default to 'none')
# @param int $format_version The version of the custom logging format used for the configured endpoint. The logging call gets placed by default in `vcl_log` if `format_version` is set to `2` and in `vcl_deliver`...
# @param string $user Your Google Cloud Platform service account email address. The `client_email` field in your service account authentication JSON. Not required if `account_name` is specified. (optional)
# @param string $secret_key Your Google Cloud Platform account secret key. The `private_key` field in your service account authentication JSON. Not required if `account_name` is specified. (optional)
# @param string $account_name The name of the Google Cloud Platform service account associated with the target log collection service. Not required if `user` and `secret_key` are provided. (optional)
# @param string $dataset Your BigQuery dataset. (optional)
# @param string $table Your BigQuery table. (optional)
# @param string $template_suffix BigQuery table name suffix template. Optional. (optional)
# @param string $project_id Your Google Cloud Platform project ID. Required (optional)
lib/WebService/Fastly/LoggingBigqueryApi.pm view on Meta::CPAN
description => 'Your Google Cloud Platform service account email address. The `client_email` field in your service account authentication JSON. Not required if `account_name` is specified.',
required => '0',
},
'secret_key' => {
data_type => 'string',
description => 'Your Google Cloud Platform account secret key. The `private_key` field in your service account authentication JSON. Not required if `account_name` is specified.',
required => '0',
},
'account_name' => {
data_type => 'string',
description => 'The name of the Google Cloud Platform service account associated with the target log collection service. Not required if `user` and `secret_key` are provided.',
view all matches for this distribution
view release on metacpan or search on metacpan
lib/WebService/MyGengo/Client.pm view on Meta::CPAN
=head1 SYNOPSIS
use WebService::MyGengo::Client;
my $client = WebService::MyGengo::Client->new({
public_key => 'pubkey'
, private_key => 'privkey'
, use_sandbox => 1
});
# Alternative constructor syntax
$client = WebService::MyGengo::Client->new('pubkey', 'privkey', $use_sandbox);
lib/WebService/MyGengo/Client.pm view on Meta::CPAN
, isa => 'Str'
, required => 1
, trigger => sub { shift->clear_request_factory }
);
=head2 private_key (Str)
Your private API key.
=cut
has private_key => (
is => 'ro'
, isa => 'Str'
, required => 1
, trigger => sub { shift->clear_request_factory }
);
lib/WebService/MyGengo/Client.pm view on Meta::CPAN
sub _build_request_factory {
my ( $self ) = ( shift );
return WebService::MyGengo::RequestFactory->new({
public_key => $self->public_key
, private_key => $self->private_key
, root_uri => $self->root_uri
});
}
=head2 last_response (L<WebService::MyGengo::Response>)
lib/WebService/MyGengo/Client.pm view on Meta::CPAN
my ( $orig, $class, $args ) = ( shift, shift, @_ );
ref($args) eq 'HASH' and return $class->$orig(@_);
my %args;
@args{ qw/public_key private_key use_sandbox _user_agent_string/ }
= @_;
return \%args;
};
view all matches for this distribution
view release on metacpan or search on metacpan
lib/WebService/NetSuite.pm view on Meta::CPAN
has 'debug' => ( is => 'rw', trigger => \&setDebug );
has 'debugfile' => ( is => 'rw', trigger => \&setDebugFile,
default => 'NetSuite.dbg' );
has 'time' => ( is => 'rw' );
has 'company' => ( is => 'ro' );
has 'rsa_private_key' => ( is => 'ro' );
has 'nsemail' => ( is => 'ro', required => 1 );
has 'nspassword' => ( is => 'ro', required => 1 );
has 'nsrole' => ( is => 'ro', writer => '_set_nsrole' );
has 'nsaccount' => ( is => 'ro', writer => '_set_nsaccount' );
has 'nsroleName' => ( is => 'ro', writer => '_set_nsroleName' );
lib/WebService/NetSuite.pm view on Meta::CPAN
sub _generate_auth_token {
my ( $self, $user_id ) = @_;
#$DB::single = 1;
my $rsa_priv =
Crypt::OpenSSL::RSA->new_private_key( $self->rsa_private_key );
$rsa_priv->use_pkcs1_padding;
# number of milliseconds since the epoch
my $super_epoch = time() * 1000;
view all matches for this distribution
view release on metacpan or search on metacpan
t/fixtures/testOccurrences/id:711,build:(id:667885).json view on Meta::CPAN
},
"details" : "",
"duration" : 1,
"href" : "/httpAuth/app/rest/testOccurrences/id:711,build:(id:667885)",
"id" : "id:711,build:(id:667885)",
"name" : "Git Suite: jetbrains.buildServer.buildTriggers.vcs.git.tests.GitUrlSupportTest.should_not_use_private_key_for_local_repository",
"status" : "SUCCESS",
"test" : {
"href" : "/httpAuth/app/rest/tests/id:-1899830473340440401",
"id" : -1899830473340440401,
"name" : "Git Suite: jetbrains.buildServer.buildTriggers.vcs.git.tests.GitUrlSupportTest.should_not_use_private_key_for_local_repository"
}
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/WebService/Xero/Agent/PrivateApplication.pm view on Meta::CPAN
return $self->_error('CONSUMER_SECRET not valid') unless ( $self->{CONSUMER_SECRET} =~ /.{20,}/m ); ## min 20 chars - 30 is typical
# KEYFILE
# PRIVATE_KEY
if ( not defined $self->{pko} and $self->{PRIVATE_KEY} =~ /BEGIN RSA PRIVATE KEY/smg )
{
$self->{pko} = Crypt::OpenSSL::RSA->new_private_key( $self->{PRIVATE_KEY} ) || return $self->_error('PRIVATE_KEY not valid');
## TODO - sort out catching error - currently crashes if fails not return undef
## could try to catch the error .. eg. RSA.xs:178: OpenSSL error: too long
## FROM Crypt::OpenSSL::RSA docs
# NOTE: Many of the methods in this package can croak, so use eval, or
# Error.pm's try/catch mechanism to capture errors. Also, while some
view all matches for this distribution
view release on metacpan or search on metacpan
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/debug/html/man3/EC_KEY_dup.html
x64-windows/debug/html/man3/EC_KEY_free.html
x64-windows/debug/html/man3/EC_KEY_generate_key.html
x64-windows/debug/html/man3/EC_KEY_get0_engine.html
x64-windows/debug/html/man3/EC_KEY_get0_group.html
x64-windows/debug/html/man3/EC_KEY_get0_private_key.html
x64-windows/debug/html/man3/EC_KEY_get0_public_key.html
x64-windows/debug/html/man3/EC_KEY_get_conv_form.html
x64-windows/debug/html/man3/EC_KEY_get_enc_flags.html
x64-windows/debug/html/man3/EC_KEY_get_ex_data.html
x64-windows/debug/html/man3/EC_KEY_get_ex_new_index.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/debug/html/man3/EC_KEY_set_enc_flags.html
x64-windows/debug/html/man3/EC_KEY_set_ex_data.html
x64-windows/debug/html/man3/EC_KEY_set_flags.html
x64-windows/debug/html/man3/EC_KEY_set_group.html
x64-windows/debug/html/man3/EC_KEY_set_method.html
x64-windows/debug/html/man3/EC_KEY_set_private_key.html
x64-windows/debug/html/man3/EC_KEY_set_public_key.html
x64-windows/debug/html/man3/EC_KEY_set_public_key_affine_coordinates.html
x64-windows/debug/html/man3/EC_KEY_up_ref.html
x64-windows/debug/html/man3/EC_METHOD_get_field_type.html
x64-windows/debug/html/man3/EC_POINT_add.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/debug/html/man3/ENGINE_get_next.html
x64-windows/debug/html/man3/ENGINE_get_prev.html
x64-windows/debug/html/man3/ENGINE_get_table_flags.html
x64-windows/debug/html/man3/ENGINE_init.html
x64-windows/debug/html/man3/ENGINE_load_builtin_engines.html
x64-windows/debug/html/man3/ENGINE_load_private_key.html
x64-windows/debug/html/man3/ENGINE_load_public_key.html
x64-windows/debug/html/man3/ENGINE_new.html
x64-windows/debug/html/man3/ENGINE_register_DH.html
x64-windows/debug/html/man3/ENGINE_register_DSA.html
x64-windows/debug/html/man3/ENGINE_register_RAND.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/debug/html/man3/EVP_PKEY_get1_DH.html
x64-windows/debug/html/man3/EVP_PKEY_get1_DSA.html
x64-windows/debug/html/man3/EVP_PKEY_get1_EC_KEY.html
x64-windows/debug/html/man3/EVP_PKEY_get1_RSA.html
x64-windows/debug/html/man3/EVP_PKEY_get_default_digest_nid.html
x64-windows/debug/html/man3/EVP_PKEY_get_raw_private_key.html
x64-windows/debug/html/man3/EVP_PKEY_get_raw_public_key.html
x64-windows/debug/html/man3/EVP_PKEY_id.html
x64-windows/debug/html/man3/EVP_PKEY_keygen.html
x64-windows/debug/html/man3/EVP_PKEY_keygen_init.html
x64-windows/debug/html/man3/EVP_PKEY_meth_add0.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/debug/html/man3/EVP_PKEY_meth_set_verifyctx.html
x64-windows/debug/html/man3/EVP_PKEY_missing_parameters.html
x64-windows/debug/html/man3/EVP_PKEY_new.html
x64-windows/debug/html/man3/EVP_PKEY_new_CMAC_key.html
x64-windows/debug/html/man3/EVP_PKEY_new_mac_key.html
x64-windows/debug/html/man3/EVP_PKEY_new_raw_private_key.html
x64-windows/debug/html/man3/EVP_PKEY_new_raw_public_key.html
x64-windows/debug/html/man3/EVP_PKEY_param_check.html
x64-windows/debug/html/man3/EVP_PKEY_paramgen.html
x64-windows/debug/html/man3/EVP_PKEY_paramgen_init.html
x64-windows/debug/html/man3/EVP_PKEY_print_params.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/debug/html/man3/SSL_CTX_add_extra_chain_cert.html
x64-windows/debug/html/man3/SSL_CTX_add_server_custom_ext.html
x64-windows/debug/html/man3/SSL_CTX_add_session.html
x64-windows/debug/html/man3/SSL_CTX_build_cert_chain.html
x64-windows/debug/html/man3/SSL_CTX_callback_ctrl.html
x64-windows/debug/html/man3/SSL_CTX_check_private_key.html
x64-windows/debug/html/man3/SSL_CTX_clear_chain_certs.html
x64-windows/debug/html/man3/SSL_CTX_clear_extra_chain_certs.html
x64-windows/debug/html/man3/SSL_CTX_clear_mode.html
x64-windows/debug/html/man3/SSL_CTX_clear_options.html
x64-windows/debug/html/man3/SSL_CTX_config.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/debug/html/man3/SSL_allow_early_data_cb_fn.html
x64-windows/debug/html/man3/SSL_build_cert_chain.html
x64-windows/debug/html/man3/SSL_bytes_to_cipher_list.html
x64-windows/debug/html/man3/SSL_callback_ctrl.html
x64-windows/debug/html/man3/SSL_check_chain.html
x64-windows/debug/html/man3/SSL_check_private_key.html
x64-windows/debug/html/man3/SSL_clear.html
x64-windows/debug/html/man3/SSL_clear_chain_certs.html
x64-windows/debug/html/man3/SSL_clear_mode.html
x64-windows/debug/html/man3/SSL_clear_options.html
x64-windows/debug/html/man3/SSL_client_hello_cb_fn.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/debug/html/man3/X509_PUBKEY_new.html
x64-windows/debug/html/man3/X509_PUBKEY_set.html
x64-windows/debug/html/man3/X509_PUBKEY_set0_param.html
x64-windows/debug/html/man3/X509_REQ_INFO_free.html
x64-windows/debug/html/man3/X509_REQ_INFO_new.html
x64-windows/debug/html/man3/X509_REQ_check_private_key.html
x64-windows/debug/html/man3/X509_REQ_digest.html
x64-windows/debug/html/man3/X509_REQ_dup.html
x64-windows/debug/html/man3/X509_REQ_free.html
x64-windows/debug/html/man3/X509_REQ_get0_pubkey.html
x64-windows/debug/html/man3/X509_REQ_get0_signature.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/debug/html/man3/X509_check_email.html
x64-windows/debug/html/man3/X509_check_host.html
x64-windows/debug/html/man3/X509_check_ip.html
x64-windows/debug/html/man3/X509_check_ip_asc.html
x64-windows/debug/html/man3/X509_check_issued.html
x64-windows/debug/html/man3/X509_check_private_key.html
x64-windows/debug/html/man3/X509_cmp.html
x64-windows/debug/html/man3/X509_cmp_current_time.html
x64-windows/debug/html/man3/X509_cmp_time.html
x64-windows/debug/html/man3/X509_delete_ext.html
x64-windows/debug/html/man3/X509_digest.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/html/man3/EC_KEY_dup.html
x64-windows/html/man3/EC_KEY_free.html
x64-windows/html/man3/EC_KEY_generate_key.html
x64-windows/html/man3/EC_KEY_get0_engine.html
x64-windows/html/man3/EC_KEY_get0_group.html
x64-windows/html/man3/EC_KEY_get0_private_key.html
x64-windows/html/man3/EC_KEY_get0_public_key.html
x64-windows/html/man3/EC_KEY_get_conv_form.html
x64-windows/html/man3/EC_KEY_get_enc_flags.html
x64-windows/html/man3/EC_KEY_get_ex_data.html
x64-windows/html/man3/EC_KEY_get_ex_new_index.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/html/man3/EC_KEY_set_enc_flags.html
x64-windows/html/man3/EC_KEY_set_ex_data.html
x64-windows/html/man3/EC_KEY_set_flags.html
x64-windows/html/man3/EC_KEY_set_group.html
x64-windows/html/man3/EC_KEY_set_method.html
x64-windows/html/man3/EC_KEY_set_private_key.html
x64-windows/html/man3/EC_KEY_set_public_key.html
x64-windows/html/man3/EC_KEY_set_public_key_affine_coordinates.html
x64-windows/html/man3/EC_KEY_up_ref.html
x64-windows/html/man3/EC_METHOD_get_field_type.html
x64-windows/html/man3/EC_POINT_add.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/html/man3/ENGINE_get_next.html
x64-windows/html/man3/ENGINE_get_prev.html
x64-windows/html/man3/ENGINE_get_table_flags.html
x64-windows/html/man3/ENGINE_init.html
x64-windows/html/man3/ENGINE_load_builtin_engines.html
x64-windows/html/man3/ENGINE_load_private_key.html
x64-windows/html/man3/ENGINE_load_public_key.html
x64-windows/html/man3/ENGINE_new.html
x64-windows/html/man3/ENGINE_register_DH.html
x64-windows/html/man3/ENGINE_register_DSA.html
x64-windows/html/man3/ENGINE_register_RAND.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/html/man3/EVP_PKEY_get1_DH.html
x64-windows/html/man3/EVP_PKEY_get1_DSA.html
x64-windows/html/man3/EVP_PKEY_get1_EC_KEY.html
x64-windows/html/man3/EVP_PKEY_get1_RSA.html
x64-windows/html/man3/EVP_PKEY_get_default_digest_nid.html
x64-windows/html/man3/EVP_PKEY_get_raw_private_key.html
x64-windows/html/man3/EVP_PKEY_get_raw_public_key.html
x64-windows/html/man3/EVP_PKEY_id.html
x64-windows/html/man3/EVP_PKEY_keygen.html
x64-windows/html/man3/EVP_PKEY_keygen_init.html
x64-windows/html/man3/EVP_PKEY_meth_add0.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/html/man3/EVP_PKEY_meth_set_verifyctx.html
x64-windows/html/man3/EVP_PKEY_missing_parameters.html
x64-windows/html/man3/EVP_PKEY_new.html
x64-windows/html/man3/EVP_PKEY_new_CMAC_key.html
x64-windows/html/man3/EVP_PKEY_new_mac_key.html
x64-windows/html/man3/EVP_PKEY_new_raw_private_key.html
x64-windows/html/man3/EVP_PKEY_new_raw_public_key.html
x64-windows/html/man3/EVP_PKEY_param_check.html
x64-windows/html/man3/EVP_PKEY_paramgen.html
x64-windows/html/man3/EVP_PKEY_paramgen_init.html
x64-windows/html/man3/EVP_PKEY_print_params.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/html/man3/SSL_CTX_add_extra_chain_cert.html
x64-windows/html/man3/SSL_CTX_add_server_custom_ext.html
x64-windows/html/man3/SSL_CTX_add_session.html
x64-windows/html/man3/SSL_CTX_build_cert_chain.html
x64-windows/html/man3/SSL_CTX_callback_ctrl.html
x64-windows/html/man3/SSL_CTX_check_private_key.html
x64-windows/html/man3/SSL_CTX_clear_chain_certs.html
x64-windows/html/man3/SSL_CTX_clear_extra_chain_certs.html
x64-windows/html/man3/SSL_CTX_clear_mode.html
x64-windows/html/man3/SSL_CTX_clear_options.html
x64-windows/html/man3/SSL_CTX_config.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/html/man3/SSL_allow_early_data_cb_fn.html
x64-windows/html/man3/SSL_build_cert_chain.html
x64-windows/html/man3/SSL_bytes_to_cipher_list.html
x64-windows/html/man3/SSL_callback_ctrl.html
x64-windows/html/man3/SSL_check_chain.html
x64-windows/html/man3/SSL_check_private_key.html
x64-windows/html/man3/SSL_clear.html
x64-windows/html/man3/SSL_clear_chain_certs.html
x64-windows/html/man3/SSL_clear_mode.html
x64-windows/html/man3/SSL_clear_options.html
x64-windows/html/man3/SSL_client_hello_cb_fn.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/html/man3/X509_PUBKEY_new.html
x64-windows/html/man3/X509_PUBKEY_set.html
x64-windows/html/man3/X509_PUBKEY_set0_param.html
x64-windows/html/man3/X509_REQ_INFO_free.html
x64-windows/html/man3/X509_REQ_INFO_new.html
x64-windows/html/man3/X509_REQ_check_private_key.html
x64-windows/html/man3/X509_REQ_digest.html
x64-windows/html/man3/X509_REQ_dup.html
x64-windows/html/man3/X509_REQ_free.html
x64-windows/html/man3/X509_REQ_get0_pubkey.html
x64-windows/html/man3/X509_REQ_get0_signature.html
corpus/root2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/html/man3/X509_check_email.html
x64-windows/html/man3/X509_check_host.html
x64-windows/html/man3/X509_check_ip.html
x64-windows/html/man3/X509_check_ip_asc.html
x64-windows/html/man3/X509_check_issued.html
x64-windows/html/man3/X509_check_private_key.html
x64-windows/html/man3/X509_cmp.html
x64-windows/html/man3/X509_cmp_current_time.html
x64-windows/html/man3/X509_cmp_time.html
x64-windows/html/man3/X509_delete_ext.html
x64-windows/html/man3/X509_digest.html
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Wireguard/WGmeta/Parser/Show.pm view on Meta::CPAN
'preshared-key' => <interface_preshared_key>,
'and_so_on' => <value_of_attr>
},
'an_interface_name => {
'interface' => <parent_interface>,
'private-key' => <interface_private_key>,
'and_so_on' => <value_of_attr>
}
},
'an_other_interface' => {
[...]
view all matches for this distribution
view release on metacpan or search on metacpan
lib/XML/Compile/WSS/Sign/RSA.pm view on Meta::CPAN
sub init($)
{ my ($self, $args) = @_;
$self->SUPER::init($args);
$self->privateKey
( $args->{private_key}
, hashing => $args->{hashing}
, padding => $args->{padding}
);
$self->publicKey
lib/XML/Compile/WSS/Sign/RSA.pm view on Meta::CPAN
sub toPrivateSHA($)
{ my ($self, $priv) = @_;
return ($priv->get_private_key_string, $priv)
if blessed $priv && $priv->isa('Crypt::OpenSSL::RSA');
error __x"unsupported private key object `{object}'", object=>$priv
if ref $priv =~ m/Crypt/;
return ($priv, Crypt::OpenSSL::RSA->new_private_key($priv))
if index($priv, "\n") >= 0;
my $key = read_file $priv;
my $rsa = eval { Crypt::OpenSSL::RSA->new_private_key($key) };
if($@)
{ error __x"cannot read private RSA key from {file}: {err}"
, file => $priv, err => $@;
}
lib/XML/Compile/WSS/Sign/RSA.pm view on Meta::CPAN
# Do we need next 4? Probably not
sub sign(@)
{ my ($self, $text) = @_;
my $priv = $self->privateKeyRSA
or error "signing rsa requires the private_key";
$priv->sign($text);
}
sub encrypt(@)
lib/XML/Compile/WSS/Sign/RSA.pm view on Meta::CPAN
}
sub decrypt(@)
{ my ($self, $text) = @_;
my $priv = $self->privateKeyRSA
or error "decrypting rsa requires the private_key";
$priv->decrypt($text);
}
#XXX Unused? See checker()
lib/XML/Compile/WSS/Sign/RSA.pm view on Meta::CPAN
### above functions probably not needed.
sub builder()
{ my ($self) = @_;
my $priv = $self->privateKeyRSA
or error "signing rsa requires the private_key";
sub { $priv->sign($_[0]) };
}
sub checker()
view all matches for this distribution
view release on metacpan or search on metacpan
lib/XML/Enc.pm view on Meta::CPAN
require Crypt::OpenSSL::X509;
};
confess "Crypt::OpenSSL::X509 needs to be installed so that we
can handle X509 Certificates." if $@;
my $x509Key = Crypt::OpenSSL::X509->new_private_key( $key_text );
if ( $x509Key ) {
$x509Key->use_pkcs1_padding();
$self->{ key_obj } = $x509Key;
$self->{key_type} = 'x509';
view all matches for this distribution
view release on metacpan or search on metacpan
exaples/sign_multi_keys.pl view on Meta::CPAN
my $x=$s->build_xpath;
# sign our first xml chunk with our rsa key!
my $rsa_str=join '',IO::File->new(File::Spec->catfile($Bin,'x509_key.pem'))->getlines;
my $rsa=Crypt::OpenSSL::RSA->new_private_key($rsa_str);
$rsa->use_pkcs1_padding();
my $cert_str=join '',IO::File->new(File::Spec->catfile($Bin,'x509_cert.pem'))->getlines;
$s->sign_cert($rsa);
$s->key_type('rsa');
$s->cert_string($cert_str);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/XML/Sig.pm view on Meta::CPAN
require Crypt::OpenSSL::X509;
};
confess "Crypt::OpenSSL::X509 needs to be installed so that we
can handle X509 Certificates." if $@;
my $x509Key = Crypt::OpenSSL::X509->new_private_key( $key_text );
if ( $x509Key ) {
$x509Key->use_pkcs1_oaep_padding();
$self->{ key_obj } = $x509Key;
$self->{key_type} = 'x509';
view all matches for this distribution
view release on metacpan or search on metacpan
libunievent/src/panda/unievent/ssl/SslFilter.cc view on Meta::CPAN
SslFilter::SslFilter (Stream* stream, const SslContext &context, const SslFilterSP& server_filter)
: StreamFilter(stream, TYPE, PRIORITY), state(State::initial), profile(Profile::UNKNOWN), server_filter(server_filter)
{
panda_log_ctor();
if (stream->listening() && !SSL_CTX_check_private_key(context)) throw Error("SSL certificate&key needed to listen()");
#ifdef RENEGOTIATION_DISABLED
SSL_CTX_set_options(context, SSL_OP_NO_RENEGOTIATION);
#endif
init(context);
}
libunievent/src/panda/unievent/ssl/SslFilter.cc view on Meta::CPAN
SSL_set_bio(raw_ssl, read_bio, write_bio);
ssl = raw_ssl;
}
void SslFilter::listen () {
if (!SSL_check_private_key(ssl)) throw Error("SSL certificate&key needed to listen()");
NextFilter::listen();
}
void SslFilter::reset () {
if (state == State::initial) return;
view all matches for this distribution
view release on metacpan or search on metacpan
xs/Curve.xs view on Meta::CPAN
keypair (class)
SV *class
PREINIT:
int rc, ctx;
SV *public_key, *private_key;
PPCODE:
ctx = GIMME_V;
if (ctx == G_VOID)
XSRETURN_EMPTY;
public_key = sv_2mortal (newSV (41));
private_key = sv_2mortal (newSV (41));
SvPOK_on (public_key);
SvPOK_on (private_key);
SvCUR_set (public_key, 40);
SvCUR_set (private_key, 40);
rc = zmq_curve_keypair (SvPVX (public_key), SvPVX (private_key));
zmq_raw_check_error (rc);
XPUSHs (private_key);
if (ctx == G_ARRAY)
{
XPUSHs (public_key);
XSRETURN (2);
}
XSRETURN (1);
SV *
public (class, private_key)
SV *class
SV *private_key
PREINIT:
int rc;
SV *public_key;
CODE:
if (SvCUR (private_key) != 40)
croak_usage ("private_key should be 40 bytes");
public_key = sv_2mortal (newSV (41));
SvPOK_on (public_key);
SvCUR_set (public_key, 40);
rc = zmq_curve_public (SvPVX (public_key), SvPVX (private_key));
zmq_raw_check_error (rc);
SvREFCNT_inc (public_key);
RETVAL = public_key;
view all matches for this distribution
view release on metacpan or search on metacpan
ldns/host2str.c view on Meta::CPAN
status=ldns_algorithm2buffer_str(output, (ldns_algorithm)ldns_key_algorithm(k));
#ifndef S_SPLINT_S
ldns_buffer_printf(output, ")\n");
if(k->_key.key) {
EC_KEY* ec = EVP_PKEY_get1_EC_KEY(k->_key.key);
const BIGNUM* b = EC_KEY_get0_private_key(ec);
if(!ldns_print_bignum_b64_line(output, "PrivateKey", b))
goto error;
/* down reference count in EC_KEY
* its still assigned to the PKEY */
EC_KEY_free(ec);
view all matches for this distribution
view release on metacpan or search on metacpan
local/lib/perl5/x86_64-linux-thread/Net/SSLeay.pm view on Meta::CPAN
NID_pkcs9_extCertAttributes
NID_pkcs9_messageDigest
NID_pkcs9_signingTime
NID_pkcs9_unstructuredAddress
NID_pkcs9_unstructuredName
NID_private_key_usage_period
NID_rc2_40_cbc
NID_rc2_64_cbc
NID_rc2_cbc
NID_rc2_cfb64
NID_rc2_ecb
view all matches for this distribution
view release on metacpan or search on metacpan
ext/channel_credentials.xs view on Meta::CPAN
if ( items % 2 ) {
croak("Expecting a hash as input to channel credentials constructor");
}
// @param string pem_root_certs PEM encoding of the server root certificates
// @param string pem_private_key PEM encoding of the client's private key
// (optional)
// @param string pem_cert_chain PEM encoding of the client's certificate chain
// (optional)
// @return ChannelCredentials The new SSL credentials object
const char* pem_root_certs = NULL;
grpc_ssl_pem_key_cert_pair pem_key_cert_pair;
pem_key_cert_pair.private_key = pem_key_cert_pair.cert_chain = NULL;
int i;
for (i = 0; i < items; i += 2 ) {
const char *key = SvPV_nolen(ST(i));
if (!strcmp( key, "pem_root_certs")) {
if (SvOK(ST(i+1)))
pem_root_certs = SvPV_nolen(ST(i+1));
} else if (!strcmp( key, "pem_private_key")) {
if (SvOK(ST(i+1)))
pem_key_cert_pair.private_key = SvPV_nolen(ST(i+1));
} else if (!strcmp( key, "pem_cert_chain")) {
if (SvOK(ST(i+1)))
pem_key_cert_pair.cert_chain = SvPV_nolen(ST(i+1));
}
}
ctx->wrapped = grpc_ssl_credentials_create(
pem_root_certs,
pem_key_cert_pair.private_key == NULL ? NULL : &pem_key_cert_pair, NULL
#ifdef GRPC_SSL_CREDENTIALS_HAS_4_ARGS
, NULL
#endif
);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/jQuery/File/Upload/Imager.pm view on Meta::CPAN
$_->{thumbnail_upload_dir} = $_->{upload_dir} if $_->{thumbnail_upload_dir} eq '';
my $path = $_->{upload_dir} . '/' . $self->filename;
my $thumb_path = $_->{thumbnail_upload_dir} . '/' . $self->thumbnail_filename;
if(($_->{user} ne '' and $_->{public_key} ne '' and $_->{private_key} ne '') or ($_->{user} ne '' and $_->{password} ne '')) {
my $ssh2 = $self->_auth_user($_);
#if it is an image, scp both file and thumbnail
if($self->is_image) {
$ssh2->scp_put($self->{tmp_file_path}, $path);
lib/jQuery/File/Upload/Imager.pm view on Meta::CPAN
my $ssh2 = Net::SSH2->new;
$ssh2->connect($auth->{host}) or die $!;
#authenticate
if($auth->{user} ne '' and $auth->{public_key} ne '' and $auth->{private_key} ne '') {
$ssh2->auth_publickey($auth->{user},$auth->{public_key},$auth->{private_key});
}
else {
$ssh2->auth_password($auth->{user},$auth->{password});
}
lib/jQuery/File/Upload/Imager.pm view on Meta::CPAN
my $j_fu = jQuery::File::Upload::Imager->new(
scp => [{
user => 'user', #remote user
public_key => '/home/user/.ssh/id_rsa.pub', #also possible to use password instead of keys
private_key => '/home/user/.ssh/id_rsa',
host => 'mydomain.com',
upload_dir => '/var/www/html/files', #directory that files will be uploaded to
}],
#user validation specifications
lib/jQuery/File/Upload/Imager.pm view on Meta::CPAN
$j_fu->scp([{
host => 'media.mydomain.com',
user => 'user',
public_key => '/home/user/.ssh/id_rsa.pub',
private_key => '/home/user/.ssh/id_rsa',
password => 'pass', #if keys are present, you do not need password
upload_dir => '/my/remote/dir',
}]);
This method takes in an arrayref of hashrefs, where each hashref is a remote host you would like to SCP the files to.
lib/jQuery/File/Upload/Imager.pm view on Meta::CPAN
user (REQUIRED) - used to identify the user to remote server
=item
public_key & private_key - used to make secure connection. Not needed if password is given.
=item
password - used along with user to authenticate with remote server. Not needed if keys are supplied.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/jQuery/File/Upload.pm view on Meta::CPAN
$_->{thumbnail_upload_dir} = $_->{upload_dir} if $_->{thumbnail_upload_dir} eq '';
my $path = $_->{upload_dir} . '/' . $self->filename;
my $thumb_path = $_->{thumbnail_upload_dir} . '/' . $self->thumbnail_filename;
if(($_->{user} ne '' and $_->{public_key} ne '' and $_->{private_key} ne '') or ($_->{user} ne '' and $_->{password} ne '')) {
my $ssh2 = $self->_auth_user($_);
#if it is an image, scp both file and thumbnail
if($self->is_image) {
$ssh2->scp_put($self->{tmp_file_path}, $path);
lib/jQuery/File/Upload.pm view on Meta::CPAN
my $ssh2 = Net::SSH2->new;
$ssh2->connect($auth->{host}) or die $!;
#authenticate
if($auth->{user} ne '' and $auth->{public_key} ne '' and $auth->{private_key} ne '') {
$ssh2->auth_publickey($auth->{user},$auth->{public_key},$auth->{private_key});
}
else {
$ssh2->auth_password($auth->{user},$auth->{password});
}
lib/jQuery/File/Upload.pm view on Meta::CPAN
my $j_fu = jQuery::File::Upload->new(
scp => [{
user => 'user', #remote user
public_key => '/home/user/.ssh/id_rsa.pub', #also possible to use password instead of keys
private_key => '/home/user/.ssh/id_rsa',
host => 'mydomain.com',
upload_dir => '/var/www/html/files', #directory that files will be uploaded to
}],
#user validation specifications
lib/jQuery/File/Upload.pm view on Meta::CPAN
$j_fu->scp([{
host => 'media.mydomain.com',
user => 'user',
public_key => '/home/user/.ssh/id_rsa.pub',
private_key => '/home/user/.ssh/id_rsa',
password => 'pass', #if keys are present, you do not need password
upload_dir => '/my/remote/dir',
}]);
This method takes in an arrayref of hashrefs, where each hashref is a remote host you would like to SCP the files to.
lib/jQuery/File/Upload.pm view on Meta::CPAN
user (REQUIRED) - used to identify the user to remote server
=item
public_key & private_key - used to make secure connection. Not needed if password is given.
=item
password - used along with user to authenticate with remote server. Not needed if keys are supplied.
view all matches for this distribution
view release on metacpan or search on metacpan
Apache-Test/lib/Apache/TestSSLCA.pm view on Meta::CPAN
database = $db # database index file.
serial = serial # The current serial number
certificate = $cacert # The CA certificate
crl = $cacrl # The current CRL
private_key = $cakey # The private key
default_days = 365 # how long to certify for
default_crl_days = 365 # how long before next CRL
default_md = $dgst # which md to use.
preserve = no # keep passed DN ordering
view all matches for this distribution
view release on metacpan or search on metacpan
lib/OxdPackages/GetClientToken.pm view on Meta::CPAN
#
# string $op_discovery_path - (Optional) Path to discovery document
#
# array $scope - (Optional) Scope
#
# string $authentication_method - (Optional) If value is missed then basic authentication is used. Otherwise it's possible to set `private_key_jwt` value for Private Key authentication.
#
# string $algorithm - (Optional) Required if authentication_method=private_key_jwt. Valid values are none, HS256, HS384, HS512, RS256, RS384, RS512, ES256, ES384, ES512
#
# string $key_id - (Optional) Required if authentication_method=private_key_jwt. It has to be valid key id from key store.
#
# Returns:
# void
#
# This module uses `getResponseObject` method of OxdClient module for getting response from oxd.
view all matches for this distribution
view release on metacpan or search on metacpan
call-anal.pl view on Meta::CPAN
zx_strf zx_ref_str zx_ref_len_str zx_dup_str zx_dup_len_str zx_dup_cstr
zx_new_len_str zx_str_to_c
zx_ref_attr zx_ref_len_attr zx_attrf zx_dup_attr zx_dup_len_attr
zx_new_str_elem zx_ref_elem zx_ref_len_elem
zx_url_encode zx_url_encode_len zx_url_encode_raw unbase64_raw
zx_rand zx_report_openssl_err zx_memmem zxid_mk_self_sig_cert zxid_extract_private_key );
push @ignore_callee,
qw(hi_pdu_alloc hi_dump nonblock setkernelbufsizes zxid_get_ent_ss zx_pw_authn
xmtp_decode_resp test_ping http_decode smtp_decode_req smtp_decode_resp );
view all matches for this distribution