view release on metacpan or search on metacpan
lib/Apache/TestCommon.pm view on Meta::CPAN
}
}
}
sub run_files_test {
my($verify, $skip_other) = @_;
my $vars = Apache::Test::vars();
my $perlpod = $vars->{perlpod};
my %pod = (
lib/Apache/TestCommon.pm view on Meta::CPAN
plan tests => $tests, sub { $pod{num} and have_lwp() };
my $ua = Apache::TestRequest::user_agent();
for my $file (@{ $pod{files} }) {
$verify->($ua, "$pod{url}/$file", "$pod{dir}/$file");
}
for my $url (sort keys %other_files) {
$verify->($ua, $url, $other_files{$url});
}
}
1;
__END__
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.50.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.55.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
sub _init{
my ($dbl, $init) = @_;
#NOTE: Because DBL is tested here for DBL compatibility, it does not need to be tested again anywhere else
#in a Wyrd. If it is defined, it is a DBL.
my $not_hash = (ref($init) ne 'HASH');
if (ref($dbl) and UNIVERSAL::can($dbl, 'verify_dbl_compatibility')) {
$_dbl = $dbl;
$dbl->log_bug("ERROR: Invalid data (non-hashref) apparently given to object as Initial Value -- Ignoring")
if ($not_hash);
}
$init = {} if ($not_hash);
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.55.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
t/lib/Test/Apache2/API.pm view on Meta::CPAN
Apache::TestRequest::user_agent(reset => 1, keep_alive => 1 );
my $ua = Apache::TestRequest->new;
# To get the fingerprint for the certificate in ./t/server.crt, do:
# echo "sha1\$$(openssl x509 -noout -in ./t/server.crt -fingerprint -sha1|perl -pE 's/^.*Fingerprint=|(\w{2})(?:\:?|$)/$1/g')"
$ua->ssl_opts(
# SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_NONE,
# SSL_verify_mode => 0x00
# verify_hostname => 0,
SSL_fingerprint => 'sha1$DEE8650E44870896E821AAE4A5A24382174D100E',
# SSL_version => 'SSLv3',
# SSL_verfifycn_name => 'localhost',
);
my $req = HTTP::Request->new( 'GET' => "${proto}://${hostport}/tests/api/some_method" );
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache2/ASP/CacheManager.pm view on Meta::CPAN
}# end retrieve()
#==============================================================================
sub verify_cache_id
{
}# end verify_cache_id()
1;# return true:
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache2/AMFCommonLib.pm view on Meta::CPAN
$UserAgent =~ s/\//|/g;
$UserAgent =~ s/\-/|/g;
$UserAgent =~ s/\_/|/g;
$UserAgent =~ s/\./|/g;
my @pairs = split(/\|/, $UserAgent);
my $deep_to_verify=scalar(@pairs) - $deep - 1;
my $ind=0;
my $string="";
if ($deep > scalar(@pairs)) {
$deep=scalar(@pairs) - 1;
}
view all matches for this distribution
view release on metacpan or search on metacpan
google/redirect.php view on Meta::CPAN
$max_auth_age = 1; // 1 second. Forces login with each request
$pape_request = new Auth_OpenID_PAPE_Request($policy_uris, $max_auth_age);
$auth_request->addExtension($pape_request);
// Redirect the user to the OpenID server for authentication.
// Store the token for this authentication so we can verify the
// response.
$redirect_url = $auth_request->redirectURL(getTrustRoot(),
getReturnTo());
view all matches for this distribution
view release on metacpan or search on metacpan
expected_cipher_type => 'Blowfish',
},
{ dbi_encryption_type => 'blowfish_pp',
expected_cipher_type => 'Blowfish_PP',
},
{ dbi_encryption_type => 'BLOWFISH_PP', # verify case-insensitive
expected_cipher_type => 'Blowfish_PP',
},
);
foreach my $case (@test_cases) {
my $dbi_encryption_type = $case->{'dbi_encryption_type'};
view all matches for this distribution
view release on metacpan or search on metacpan
AuthNetLDAP.pm view on Meta::CPAN
my $ldap = new Net::LDAP($ldapserver, port => $ldapport);
if (lc $start_TLS eq 'yes')
{
$ldap->start_tls(verify => 'none')
or $r->log_error( "Unable to start_tls", $r->uri);
}
my $mesg;
#initial bind as user in Apache config
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache2/AuthZLDAP.pm view on Meta::CPAN
# How to handle the certificate verification for ldaps:// URIs
# See start_tls in Net::LDAP for more information
# If you set any of the LDAPSSL* variables, be sure to include only
# ldaps:// URIs. Otherwise the connection will fail.
# (none|optional|require)
PerlSetVar LDAPSSLverify none
# Set to a directory that contains the CA certs
PerlSetVar LDAPSSLcapath /path/to/cadir
# Set to a file that contains the CA cert
lib/Apache2/AuthZLDAP.pm view on Meta::CPAN
PerlSetVar LDAPTLS yes
# How to handle the certificate verification
# See start_tls in Net::LDAP for more information
# (none|optional|require)
PerlSetVar LDAPTLSverify none
# Set to a directory that contains the CA certs
PerlSetVar LDAPTLScapath /path/to/cadir
# Set to a file that contains the CA cert
lib/Apache2/AuthZLDAP.pm view on Meta::CPAN
return Apache2::Const::OK unless $r->is_initial_req;
## Location Variables to connect to the good server
my @LDAPURI = $r->dir_config->get('LDAPURI');
my $LDAPSSLverify = lc($r->dir_config('LDAPSSLverify'));
my $LDAPSSLcapath = $r->dir_config('LDAPSSLcapath');
my $LDAPSSLcafile = $r->dir_config('LDAPSSLcafile');
my $LDAPTLS = lc($r->dir_config('LDAPTLS')) || "no";
my $LDAPTLSverify = lc($r->dir_config('LDAPTLSverify'));
my $LDAPTLScapath = $r->dir_config('LDAPTLScapath');
my $LDAPTLScafile = $r->dir_config('LDAPTLScafile');
if($LDAPTLS ne "yes" && $LDAPTLS ne "no"){
$LDAPTLS="no";
lib/Apache2/AuthZLDAP.pm view on Meta::CPAN
## port initialisation
my $session; ## TODO make this come from a pool maybe?
my $mesg;
unless ($session = Net::LDAP->new(\@LDAPURI, capath=>$LDAPSSLcapath, cafile=>$LDAPSSLcafile, verify=>$LDAPSSLverify)) {
$r->log_error("Apache2::AuthZLDAP : $location, LDAP error cannot create session");
return Apache2::Const::HTTP_UNAUTHORIZED;
}
if ($LDAPTLS eq 'yes') {
$mesg = $session->start_tls(capath=>$LDAPTLScapath, cafile=>$LDAPTLScafile, verify=>$LDAPTLSverify);
if ($mesg->code) {
$r->log_error("Apache2::AuthZLDAP : $location, LDAP error could not start TLS : ".$mesg->error);
}
return Apache2::Const::HTTP_UNAUTHORIZED;
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache2/AuthNSympa.pm view on Meta::CPAN
my $AuthenType = "";
my $auth_type = lc($r->auth_type());
my $requires = $r->requires;
my $location = $r->location();
# verify if require valid-user is present, if not, authentication is not for this module
for my $entry (@$requires){
my $requirement = $entry->{requirement};
if ($requirement eq 'valid-user' && $auth_type eq 'basic'){
$AuthenType = 'Sympa';
$r->log->debug("Apache2::AuthNSympa : require type '$requirement' for $location ","Sympa");
lib/Apache2/AuthNSympa.pm view on Meta::CPAN
return Apache2::Const::DECLINED;
}else{
$response=$soap->login($mail_user,$password);
}
## verify if error during soap service request
if ($soap_error==1){
my ($type_error,$detail) = &traite_soap_error($soap, $soap_res);
if ($type_error eq 'ERROR'){
$r->log_error("Apache2::AuthNSympa : SOAP error $detail while accessing $location");
}else{
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Crypt/OdinAuth.pm view on Meta::CPAN
use constant OLD_COOKIE => 24*60*60; # cookie older than 24h is discarded
=head1 SYNOPSIS
This module exports functions for calculating and verifying signed
cookies for OdinAuth SSO Apache handler.
use Crypt::OdinAuth;
Crypt::OdinAuth::hmac_for('secret', 'login_name', 'role1,role2,role3', 1337357387, 'netcat')
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.79.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache2/AuthenNIS.pm view on Meta::CPAN
was a direct adaptation of Michael Parker's (B<parker@austx.tandem.com>)
Apache::AuthenSmb module.
The module uses Net::NIS::yp_match to retrieve the "passwd" entry from the
passwd.byname map, using the supplied username as the search key. It then
uses crypt() to verify that the supplied password matches the retrieved
hashed password.
=head2 Parameters
view all matches for this distribution
view release on metacpan or search on metacpan
AuthenNTLM.pm view on Meta::CPAN
};
}
$self -> {smbhandle} = Authen::Smb::Valid_User_Connect ($pdc, $bdc, $domain, $nonce) ;
print STDERR "[$$] AuthenNTLM: verify handle $self->{username} smbhandle == $self->{smbhandle} \n" if ($debug) ;
if (!$self -> {smbhandle})
{
$r->log_error("Connect to SMB Server failed (pdc = $pdc bdc = $bdc domain = $domain error = "
. Authen::Smb::SMBlib_errno . '/' . Authen::Smb::SMBlib_SMB_Error . ") for " .
AuthenNTLM.pm view on Meta::CPAN
return $self -> {nonce} = $nonce ;
}
sub verify_user
{
my ($self, $r) = @_ ;
if (!$self -> {smbhandle})
{
AuthenNTLM.pm view on Meta::CPAN
my $header1 = $self -> set_msg2 ($r, $nonce) ;
my $hdr = $r -> err_headers_out ;
$hdr -> add ($r->proxyreq ? 'Proxy-Authenticate' : 'WWW-Authenticate', $header1) if ($self -> {authntlm}) ;
# $r->discard_request_body ;
print STDERR "[$$] AuthenNTLM: verify handle = 1 smbhandle == $self->{smbhandle} \n" if ($debug) ;
return Apache2::Const::HTTP_UNAUTHORIZED ;
}
elsif ($type == 3)
{
print STDERR "[$$] handler type == 3 \n" if ($debug) ;
print STDERR "[$$] AuthenNTLM: verify handle = 3 smbhandle == $self->{smbhandle} \n" if ($debug) ;
if ( !$self->verify_user( $r ) )
{
if ( $self->{ntlmauthoritative} )
{
my $hdr = $r -> err_headers_out ;
$hdr -> add ($r->proxyreq ? 'Proxy-Authenticate' : 'WWW-Authenticate', 'NTLM') if ($self -> {authntlm}) ;
AuthenNTLM.pm view on Meta::CPAN
$self -> {lock} = undef ; # reset lock in case anything has gone wrong
$r->log_error("Cannot get nonce for " . $r->uri) ;
return Apache2::Const::HTTP_INTERNAL_SERVER_ERROR ;
}
if (!$self -> verify_user ($r))
{
if ($self -> {basicauthoritative})
{
my $hdr = $r -> err_headers_out ;
$hdr -> add ($r->proxyreq ? 'Proxy-Authenticate' :'WWW-Authenticate', 'Basic realm="'
AuthenNTLM.pm view on Meta::CPAN
The NTLM protocol performs a challenge/response to exchange a random number
(nonce) and get back a md4 hash, which is built from the user's password
and the nonce. This makes sure that no password goes over the wire in plain text.
The main advantage of the Perl implementation is, that it can be easily extended
to verify the user/password against other sources than a windows domain controller.
The defaultf implementation is to go to the domain controller for the given domain
and verify the user. If you want to verify the user against another source, you
can inherit from Apache2::AuthenNTLM and override it's methods.
To support users that aren't using Internet Explorer, Apache2::AuthenNTLM can
also perform basic authentication depending on its configuration.
AuthenNTLM.pm view on Meta::CPAN
=head2 PerlSetVar ntlmauthoritative
Setting the ntlmauthoritative directive explicitly to 'off' allows authentication
to be passed on to lower level modules if AuthenNTLM cannot authenticate the user
and the NTLM authentication scheme is used.
If set to 'on', which is the default, AuthenNTLM will try to verify the user and,
if it fails, will give an Authorization Required reply.
=head2 PerlSetVar basicauthoritative
Setting the ntlmauthoritative directive explicitly to 'off' allows authentication
to be passed on to lower level modules if AuthenNTLM cannot authenticate the user
and the Basic authentication scheme is used.
If set to 'on', which is the default, AuthenNTLM will try to verify the user and
if it fails will give an Authorization Required reply.
=head2 PerlSetVar ntlmsemkey
There are troubles when two authentication requests take place at the same
AuthenNTLM.pm view on Meta::CPAN
Will be called to setup the connection to the windows domain controller
for $self -> {domain} and retrieve the nonce.
In case you do not authenticate against a windows machine, you simply need
to set $self -> {nonce} to a 8 byte random string. Returns undef on error.
=head2 $self -> verify_user ($r)
Should verify that the given user supplied the right credentials. Input:
=over
=item $self -> {basic}
view all matches for this distribution
view release on metacpan or search on metacpan
Auth/Auth.pm view on Meta::CPAN
=item *
AuthUserCookie
The name of the of cookie that contains the value of the persons username
in plain text. This is checked against the contents of the encrypted cookie
to verify user. The cookie is set of other applications can identify
authorized users. It defaults to F<SecurID_User> if this variable is not set.
=item *
AuthCookiePath
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.79.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
F<ppport.h> on your source code. See the next section for
details.
=head1 EXAMPLES
To verify whether F<ppport.h> is needed for your module, whether you
should make any changes to your code, and whether any special defines
should be used, F<ppport.h> can be run as a Perl script to check your
source code. Simply say:
perl ppport.h
vmess||5.006000|
vnewSVpvf|5.006000|5.004000|p
vnormal||5.009002|
vnumify||5.009000|
vstringify||5.009000|
vverify||5.009003|
vwarner||5.006000|
vwarn||5.006000|
wait4pid|||
warn_nocontext|||vn
warner_nocontext|||vn
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache2/Controller/Auth/OpenID.pm view on Meta::CPAN
return $self->redirect_to($conf{login});
}
$openid_url = $self->{openid_url} = $self->openid_url_normalize($openid_url);
# first verify that we know about this openid url, and redirect to
# the registration page if we don't
DEBUG "looking for uname from openid table using openid_url '$openid_url'";
my $uname = $self->get_uname($openid_url);
view all matches for this distribution
view release on metacpan or search on metacpan
FileManager.pm view on Meta::CPAN
r->log_error("Warning: Document root changed to $dr.".
" Custom document root must lie inside of ".
"real document root.");
}
#verify current working directory
$_ = r->param('FILEMANAGER_curr_dir');
s/\.\.//g; s/^\///; s/\/$//;
my $curr_dir = $_;
#set current directory
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.55.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.55.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
F<ppport.h> on your source code. See the next section for
details.
=head1 EXAMPLES
To verify whether F<ppport.h> is needed for your module, whether you
should make any changes to your code, and whether any special defines
should be used, F<ppport.h> can be run as a Perl script to check your
source code. Simply say:
perl ppport.h
vmess||5.006000|
vnewSVpvf|5.006000|5.004000|p
vnormal||5.009002|
vnumify||5.009000|
vstringify||5.009000|
vverify||5.009003|
vwarner||5.006000|
vwarn||5.006000|
wait4pid|||
warn_nocontext|||vn
warner_nocontext|||vn
view all matches for this distribution
view release on metacpan or search on metacpan
t/1is_https.t view on Meta::CPAN
Apache::TestRequest::user_agent
(reset=>1,
ssl_opts=>{
SSL_ca_file=>undef,
SSL_verify_mode=>0,
});
if( ssl_loaded ) {
#if( need_module 'ssl' ) {
plan tests => 2;
view all matches for this distribution
view release on metacpan or search on metacpan
F<ppport.h> on your source code. See the next section for
details.
=head1 EXAMPLES
To verify whether F<ppport.h> is needed for your module, whether you
should make any changes to your code, and whether any special defines
should be used, F<ppport.h> can be run as a Perl script to check your
source code. Simply say:
perl ppport.h
vmess||5.006000|
vnewSVpvf|5.006000|5.004000|p
vnormal||5.009002|
vnumify||5.009000|
vstringify||5.009000|
vverify||5.009003|
vwarner||5.006000|
vwarn||5.006000|
wait4pid|||
warn_nocontext|||vn
warner_nocontext|||vn
view all matches for this distribution
view release on metacpan or search on metacpan
User check
Client IP checking may not be sufficient. The filter could check
"$r->user", set a special flag in the redirect param and save the
user name. The rewrite rules could then check the flag and require a
valid-user. Then the response handler can verify "$r->user" against
the saved user.
SEE ALSO
Apache2::Translation
view all matches for this distribution
view release on metacpan or search on metacpan
eg/Model/MyPageKit/Common.pm view on Meta::CPAN
my ($login, $epasswd) = $dbh->selectrow_array($sql_str,{},$user_id);
return unless $login;
# create a new hash and verify that it matches the supplied hash
# (prevents tampering with the cookie)
no strict 'refs';
my $newhash = Digest::MD5::md5_hex(join ':', ${ __PACKAGE__ . '::secret_md5' }, $user_id, crypt($epasswd,"pk"));
use strict 'refs';
view all matches for this distribution
view release on metacpan or search on metacpan
.svn/text-base/MANIFEST.svn-base view on Meta::CPAN
t/htdocs/stats/stats.js
t/htdocs/varsub/bar/baz.js
t/htdocs/varsub/foo/baz.js
t/htdocs/varsub/varsub-do.js
t/htdocs/varsub/varsub.js
t/htdocs/verify.js
t/TEST
view all matches for this distribution