view release on metacpan or search on metacpan
* basic support for OpenID extensions (2006-03-13)
0.10: (2005-09-01)
* fix up old docs which mentioned the ancient public_key and
private_key parameters
* fix some warnings in make test. (Tatsuhiko Miyagawa)
0.09:
* version 1.1 of the protocol, with 1.0 as a "compat" option
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Net/OpenSSH.pm view on Meta::CPAN
=item passphrase => $passphrase
X<passphrase>Uses given passphrase to open private key.
=item key_path => $private_key_path
Uses the key stored on the given file path for authentication.
=item gateway => $gateway
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Net/SAML2/Binding/Redirect.pm view on Meta::CPAN
sub _sign_redirect_uri {
my $self = shift;
my $uri = shift;
my $key_string = read_text($self->key);
my $rsa_priv = Crypt::OpenSSL::RSA->new_private_key($key_string);
my $method = "use_" . $self->sig_hash . "_hash";
$rsa_priv->$method;
$uri->query_param('SigAlg',
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Net/SPID/SAML.pm view on Meta::CPAN
sub _build_sp_key {
my ($self) = @_;
my $key_string = read_file($self->sp_key_file);
my $key = Crypt::OpenSSL::RSA->new_private_key($key_string);
$key->use_sha256_hash;
return $key;
}
sub _build_sp_cert {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Net/SSH/Any/Test.pm view on Meta::CPAN
=item password => $password
Sets the SSH password.
=item key_path => $private_key_path
=item key_paths => \@private_key_paths
Path to files containing private keys to use for authentication.
=item backend_opts => { $backend_name => \%opts, ... }
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Net/SSH/Perl/Auth/RSA.pm view on Meta::CPAN
sub _authenticate {
my($auth, $auth_file) = @_;
my $ssh = $auth->{ssh};
my($packet);
my($public_key, $comment, $private_key);
eval {
($public_key, $comment) = _load_public_key($auth_file);
};
$ssh->debug("RSA authentication failed: Can't load public key."),
return 0 if $@;
lib/Net/SSH/Perl/Auth/RSA.pm view on Meta::CPAN
my $challenge = $packet->get_mp_int;
$ssh->debug("Received RSA challenge from server.");
eval {
$private_key = _load_private_key($auth_file, "");
};
if (!$private_key || $@) {
my $passphrase = "";
if ($ssh->config->get('interactive')) {
$passphrase = _read_passphrase("Enter passphrase for RSA key '$comment': ");
}
else {
$ssh->debug("Will not query passphrase for '$comment' in batch mode.");
}
eval {
$private_key = _load_private_key($auth_file, $passphrase);
};
if (!$private_key || $@) {
$ssh->debug("Loading private key failed: $@.");
$packet = $ssh->packet_start(SSH_CMSG_AUTH_RSA_RESPONSE);
$packet->put_char(0) for (1..16);
$packet->send;
Net::SSH::Perl::Packet->read_expect($ssh, SSH_SMSG_FAILURE);
return 0;
}
}
_respond_to_rsa_challenge($ssh, $challenge, $private_key);
$packet = Net::SSH::Perl::Packet->read($ssh);
my $type = $packet->type;
if ($type == SSH_SMSG_SUCCESS) {
$ssh->debug("RSA authentication accepted by server.");
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Net/SSLeay/OO/Context.pm view on Meta::CPAN
sess_cache_full(ctx)
sess_get_cache_size(ctx)
sess_set_cache_size(ctx,size)
add_client_CA(ctx,x)
callback_ctrl(ctx,i,fp)
check_private_key(ctx)
get_ex_data(ssl,idx)
get_quiet_shutdown(ctx)
get_timeout(ctx)
get_verify_depth(ctx)
get_verify_mode(ctx)
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Net/SSLeay.pm view on Meta::CPAN
NID_pkcs9_extCertAttributes
NID_pkcs9_messageDigest
NID_pkcs9_signingTime
NID_pkcs9_unstructuredAddress
NID_pkcs9_unstructuredName
NID_private_key_usage_period
NID_rc2_40_cbc
NID_rc2_64_cbc
NID_rc2_cbc
NID_rc2_cfb64
NID_rc2_ecb
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Net/SAML2/Binding/Redirect.pm view on Meta::CPAN
$u->query_param($self->param, $req);
$u->query_param('RelayState', $relaystate) if defined $relaystate;
$u->query_param('SigAlg', 'http://www.w3.org/2000/09/xmldsig#rsa-sha1');
my $key_string = read_file($self->key);
my $rsa_priv = Crypt::OpenSSL::RSA->new_private_key($key_string);
my $to_sign = $u->query;
my $sig = encode_base64($rsa_priv->sign($to_sign), '');
$u->query_param('Signature', $sig);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Net/Simplify.pm view on Meta::CPAN
use Net::Simplify;
# Set global API keys
$Net::Simplify::public_key = 'YOUR PUBLIC KEY';
$Net::Simplify::private_key = 'YOUR PRIVATE KEY';
# Create a payment
my $payment = Net::Simplify::Payment->create({
amount => 1200,
currency => 'USD',
lib/Net/Simplify.pm view on Meta::CPAN
# Use an Authentication object to hold credentials
my $auth = Net::Simplify::Authentication->create({
public_key => 'YOUR PUBLIC KEY',
private_key => 'YOUR PRIVATE_KEY'
};
# Create a payment using the $auth object
my $payment2 = Net::Simplify::Payment->create({
amount => 2400,
lib/Net/Simplify.pm view on Meta::CPAN
=head3 $Net::Simplify::public_key
The public key to be used for all API calls where an Authentication object is not passed.
=head3 $Net::Simplify::private_key
The private key to be used for all API calls where an Authentication object is not passed.
=head3 $Net::Simplify::user_agent
lib/Net/Simplify.pm view on Meta::CPAN
use warnings FATAL => 'all';
use Net::Simplify::Constants;
$Net::Simplify::public_key = undef;
$Net::Simplify::private_key = undef;
$Net::Simplify::api_base_live_url = $Net::Simplify::Constants::API_BASE_LIVE_URL;
$Net::Simplify::api_base_sandbox_url = $Net::Simplify::Constants::API_BASE_SANDBOX_URL;
$Net::Simplify::oauth_base_url = $Net::Simplify::Constants::OAUTH_BASE_URL;
$Net::Simplify::user_agent = undef;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Net/Wireless/802_11/AP.pm view on Meta::CPAN
anonymous_identity=>undef,
mixed_cell=>undef,
password=>undef,
ca_cert=>undef,
client_cert=>undef,
private_key=>undef,
private_key_passwd=>undef,
dh_file=>undef,
subject_match=>undef,
phase1=>undef,
phase2=>undef,
ca_cert2=>undef,
client_cert2=>undef,
private_key2=>undef,
private_key2_passwd=>undef,
dh_file2=>undef,
subject_match2=>undef,
eappsk=>undef,
nai=>undef,
server_nai=>undef,
lib/Net/Wireless/802_11/AP.pm view on Meta::CPAN
anonymous_identity=>1,
mixed_cell=>1,
password=>1,
ca_cert=>1,
client_cert=>1,
private_key=>1,
private_key_passwd=>1,
dh_file=>1,
subject_match=>1,
phase1=>1,
phase2=>1,
ca_cert2=>1,
client_cert2=>1,
private_key2=>1,
private_key2_passwd=>1,
dh_file2=>1,
subject_match2=>1,
eappsk=>1,
nai=>1,
server_nai=>1,
lib/Net/Wireless/802_11/AP.pm view on Meta::CPAN
anonymous_identity=>1,
mixed_cell=>1,
password=>1,
ca_cert=>1,
client_cert=>1,
private_key=>1,
private_key_passwd=>1,
dh_file=>1,
subject_match=>1,
phase1=>1,
phase2=>1,
ca_cert2=>1,
client_cert2=>1,
private_key2=>1,
private_key2_passwd=>1,
dh_file2=>1,
subject_match2=>1,
eappsk=>1,
nai=>1,
server_nai=>1,
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Net/Xero.pm view on Meta::CPAN
timestamp => time,
nonce => $self->nonce,
callback => $self->callback_url,
);
my $private_key = Crypt::OpenSSL::RSA->new_private_key($self->cert);
$request->sign($private_key);
my $res = $self->ua->request(GET $request->to_url);
if ($res->is_success) {
my $response =
Net::OAuth->response('request token')
lib/Net/Xero.pm view on Meta::CPAN
nonce => $self->nonce,
callback => $self->callback_url,
token => $self->request_token,
token_secret => $self->request_secret,
);
my $private_key = Crypt::OpenSSL::RSA->new_private_key($self->cert);
$request->sign($private_key);
my $res = $self->ua->request(GET $request->to_url);
if ($res->is_success) {
my $response =
Net::OAuth->response('access token')->from_post_body($res->content);
lib/Net/Xero.pm view on Meta::CPAN
$content = $self->_template($hash);
$opts{extra_params} = { xml => $content } if ($method eq 'POST');
}
my $request = Net::OAuth->request("protected resource")->new(%opts);
my $private_key = Crypt::OpenSSL::RSA->new_private_key($self->cert);
$request->sign($private_key);
#my $req = HTTP::Request->new($method, $request->to_url);
my $req = HTTP::Request->new($method, $request_url);
if ($hash and ($method eq 'POST')) {
$req->content($request->to_post_body);
$req->header('Content-Type' =>
view all matches for this distribution
view release on metacpan or search on metacpan
src/event/ngx_event_openssl.c view on Meta::CPAN
return NGX_ERROR;
}
*last++ = ':';
pkey = ENGINE_load_private_key(engine, (char *) last, 0, 0);
if (pkey == NULL) {
ngx_ssl_error(NGX_LOG_EMERG, ssl->log, 0,
"ENGINE_load_private_key(\"%s\") failed", last);
ENGINE_free(engine);
return NGX_ERROR;
}
ENGINE_free(engine);
view all matches for this distribution
view release on metacpan or search on metacpan
examples/generate_rsa_keys.pl view on Meta::CPAN
my $rsa = Crypt::OpenSSL::RSA->generate_key(1024);
say $rsa->get_public_key_string();
say $rsa->get_private_key_string();
view all matches for this distribution
view release on metacpan or search on metacpan
t/WrapScope/ConfigGenerator/sample_tree/Secret/Encryption.pm view on Meta::CPAN
package Secret::Encryption;
sub get_private_keys { }
sub hash { }
1;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Padre/Plugin/Encrypt.pm view on Meta::CPAN
my @layout = (
[ [ 'Wx::StaticText', undef, 'Type:' ],
[ 'Wx::ComboBox', '_type_', $type, \@types ],
],
[ [ 'Wx::StaticText', undef, 'Private key:' ],
[ 'Wx::TextCtrl', '_private_key_', '' ],
],
[ [ 'Wx::Button', '_ok_', Wx::wxID_OK ],
[ 'Wx::Button', '_cancel_', Wx::wxID_CANCEL ],
],
);
lib/Padre/Plugin/Encrypt.pm view on Meta::CPAN
);
$dialog->{_widgets_}{_ok_}->SetDefault;
Wx::Event::EVT_BUTTON( $dialog, $dialog->{_widgets_}{_ok_}, \&ok_clicked );
Wx::Event::EVT_BUTTON( $dialog, $dialog->{_widgets_}{_cancel_}, \&cancel_clicked );
$dialog->{_widgets_}{_private_key_}->SetFocus;
$dialog->Show(1);
}
sub cancel_clicked {
lib/Padre/Plugin/Encrypt.pm view on Meta::CPAN
my $main = Padre->ide->wx->main;
my $data = $dialog->get_data;
$dialog->Destroy;
my $private_key = $data->{_private_key_};
unless ( length($private_key) ) {
$main->message( Wx::gettext("Private key is required") );
return;
}
my $type = $data->{_type_};
lib/Padre/Plugin/Encrypt.pm view on Meta::CPAN
return unless $doc;
my $code = $doc->text_get;
require Crypt::CBC;
my $cipher = Crypt::CBC->new(
-key => $private_key,
-cipher => 'Blowfish'
);
eval {
if ( $type eq 'encrypt' )
view all matches for this distribution
view release on metacpan or search on metacpan
t/100_parse_gdb.t view on Meta::CPAN
??
free
load_encrypted_key
parsed_pem_block
egg_openssl_pem_parse
gck_ssh_openssh_parse_private_key
unlock_private_key
realize_and_take_data
gck_ssh_private_key_parse
)],
},
# Ends in a frame that has an open-paren with no close-paren.
'gnome-bug-579416' => {
threads => 2,
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Paws/CognitoIdp/CreateIdentityProvider.pm view on Meta::CPAN
key_id
=item *
private_key
=item *
authorize_scopes
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Pcore/API/Majestic.pm view on Meta::CPAN
has username => ( is => 'ro', isa => Str );
has password => ( is => 'ro', isa => Str );
has api_key => ( is => 'ro', isa => Maybe [Str] ); # direct access to the API, access is restricted by IP address
has openapp_access_token => ( is => 'ro', isa => Maybe [Str] ); # OpenApp access, user key, identify user
has openapp_private_key => ( is => 'ro', isa => Maybe [Str] ); # OpenApp access, application vendor key, identify application
has bind_ip => ( is => 'ro', isa => Maybe [Str] );
has _cookies => ( is => 'ro', isa => HashRef, init_arg => undef );
has _cookies_time => ( is => 'ro', isa => Int, init_arg => undef );
has _login_requests => ( is => 'ro', isa => ArrayRef, init_arg => undef );
lib/Pcore/API/Majestic.pm view on Meta::CPAN
sub _request ( $self, $url_params, $cb ) {
if ( $self->api_key ) {
$url_params->{app_api_key} = $self->api_key;
}
elsif ( $self->openapp_private_key && $self->openapp_access_token ) {
$url_params->{accesstoken} = $self->openapp_access_token;
$url_params->{privatekey} = $self->openapp_private_key;
}
else {
die q["api_key" or "openapp_private_key" and "openapp_access_token" are missed];
}
my $url = 'http://api.majestic.com/api/json?' . P->data->to_uri($url_params);
P->http->get(
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Pcore/API/Google/OAuth.pm view on Meta::CPAN
};
sub BUILD ( $self, $args ) {
$self->{key} = P->cfg->read( $self->{key} ) if !is_ref $self->{key};
$self->{_openssl_rsa} = Crypt::OpenSSL::RSA->new_private_key( $self->{key}->{private_key} );
$self->{_openssl_rsa}->use_sha256_hash;
return;
}
view all matches for this distribution
view release on metacpan or search on metacpan
t/Perl/Critic/Policy/ControlStructures/ProhibitMultipleSubscripts.run view on Meta::CPAN
}
else {
$cred_ref->{password} = default_password();
}
if ($cred_ref->{key}) {
$cred_ref->{key} = encrypt_private_key($cred_ref->{key});
}
else {
$cred_ref->{key} = default_key();
}
}
t/Perl/Critic/Policy/ControlStructures/ProhibitMultipleSubscripts.run view on Meta::CPAN
and $cred_ref->{port} != 23
) {
$cred_ref->{host} = $cred_ref->{host} . ':' . $cred_ref->{port};
}
$cred_ref->{password} = decrypt_password($cred_ref->{password}) if $cred_ref->{password};
$cred_ref->{key} = decrypt_private_key($cred_ref->{key}) if $cred_ref->{key};
}
## name Nested subscript
## failures 0
## cut
view all matches for this distribution
view release on metacpan or search on metacpan
local/lib/perl5/x86_64-linux-thread-multi/Net/SSLeay.pm view on Meta::CPAN
NID_pkcs9_extCertAttributes
NID_pkcs9_messageDigest
NID_pkcs9_signingTime
NID_pkcs9_unstructuredAddress
NID_pkcs9_unstructuredName
NID_private_key_usage_period
NID_rc2_40_cbc
NID_rc2_64_cbc
NID_rc2_cbc
NID_rc2_cfb64
NID_rc2_ecb
view all matches for this distribution
view release on metacpan or search on metacpan
t/oauth_rsa.t view on Meta::CPAN
lRxOVeest+mBRKqPrEgKYpsjiduIT0MiqHFdGR7DhYGtV1Sgn75+WoLj/S9t58wg
a5eBaoJl/UzNBxENLgWoI3TtdYiZoXFysMjqsFIqQKFo/fLCyZ3pAgMBAAE=
-----END RSA PUBLIC KEY-----
__END_OF_INVALID__
my $private_key = <<__END_OF_PRIVATE__;
-----BEGIN RSA PRIVATE KEY-----
MIICWwIBAAKBgQDeIxWdTsSwC3SXIqz9HkNMnaGfA3N8nP1H1jET+SXN6zdM8Ckn
pWZKICP3A3YP2l7mcHRxcMCNq36q6bZLoIU96TyapjMfMwMdZ8fQkaY4S36BW3pv
sGvYXE1x5a/Sb0aEQAJ23Y7xxOQ0/p4kM6dhPx/QeGvTd7YQ4rQv1U0hVwIDAQAB
AoGAQHpwmLO3dd4tXn1LN0GkiUWsFyr6R66N+l8a6dBE/+uJpsSDPaXN9jA0IEwZ
t/oauth_rsa.t view on Meta::CPAN
oauth_consumer_key => $args{consumer_key},
);
my $consumer = OAuth::Lite::Consumer->new(
signature_method => $params{oauth_signature_method},
consumer_secret => $private_key,
realm => $args{realm},
_nonce => $args{nonce},
_timestamp => $args{timestamp},
);
view all matches for this distribution
view release on metacpan or search on metacpan
die('Missing providers')
unless scalar grep { exists $conf->{providers}->{$_} } ALLOWED_PROVIDERS;
BEGIN {
user 'root';
private_key($ENV{PRIVATE_KEY} || die 'Missing PRIVATE_KEY');
public_key(
(
-r $ENV{PRIVATE_KEY} . '.pub'
? $ENV{PRIVATE_KEY} . '.pub'
: $ENV{PUBLIC_KEY}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Postini/SAML.pm view on Meta::CPAN
# load the keyfile and prepare a context for signing
open my $key_fh, '<', $key_file or croak "couldn't open $key_file for reading: $!";
my $key_text = do { local $/; <$key_fh> };
close $key_fh;
my $key = Crypt::OpenSSL::RSA->new_private_key( $key_text );
if ( not $key )
{
croak "failed to instantiate Crypt::OpenSSL::RSA object from $key_file";
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Protocol/ACME.pm view on Meta::CPAN
"Protocol::ACME object. This will use a native openssl binary instead.";
}
eval
{
$key = Crypt::OpenSSL::RSA->new_private_key($keystring);
};
if ( $@ )
{
_throw( "Error creating a key structure from the account key" );
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Protocol/OTR.pm view on Meta::CPAN
use Protocol::OTR qw( :constants );
my $otr = Protocol::OTR->new(
{
privkeys_file => "otr.private_key",
contacts_file => "otr.fingerprints",
instance_tags_file => "otr.instance_tags",
}
);
lib/Protocol/OTR.pm view on Meta::CPAN
=head2 new
my $otr = Protocol::OTR->new(
{
privkeys_file => "otr.private_key",
contacts_file => "otr.fingerprints",
instance_tags_file => "otr.instance_tags",
}
);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Puppet/Classify.pm view on Meta::CPAN
my $uri = "https://".$self->server_name.":".$self->server_port."/classifier-api/v1/groups/$id";
my $ssl_opts = { verify_hostname => 1, SSL_ca_file => $self->puppet_ssl_path."/certs/ca.pem" };
if( $self->cert_name ){
$ssl_opts->{SSL_cert_file} = $self->puppet_ssl_path."/certs/".$self->cert_name.".pem";
$ssl_opts->{SSL_key_file} = $self->puppet_ssl_path."/private_keys/".$self->cert_name.".pem";
} else {
%headers = ( 'X-Authentication' => $self->access_token );
}
my $ua = LWP::UserAgent->new( timeout => $self->timeout, ssl_opts => $ssl_opts );
lib/Puppet/Classify.pm view on Meta::CPAN
my $uri = "https://".$self->server_name.":".$self->server_port."/classifier-api/v1/$action";
my $req = HTTP::Request->new( $type, $uri );
my $ssl_opts = { verify_hostname => 1, SSL_ca_file => $self->puppet_ssl_path."/certs/ca.pem" };
if( $self->cert_name ){
$ssl_opts->{SSL_cert_file} = $self->puppet_ssl_path."/certs/".$self->cert_name.".pem";
$ssl_opts->{SSL_key_file} = $self->puppet_ssl_path."/private_keys/".$self->cert_name.".pem";
} else {
$req->header( 'X-Authentication' => $self->access_token );
}
my $ua = LWP::UserAgent->new( timeout => $self->timeout, ssl_opts => $ssl_opts );
if( $type eq 'POST' ){
lib/Puppet/Classify.pm view on Meta::CPAN
my $uri = "https://".$self->server_name.":".$self->server_port."/classifier-api/v1/$action";
my $req = HTTP::Request->new( 'GET', $uri );
my $ssl_opts = { verify_hostname => 1, SSL_ca_file => $self->puppet_ssl_path."/certs/ca.pem" };
if( $self->has_cert_name ){
$ssl_opts->{SSL_cert_file} = $self->puppet_ssl_path."/certs/".$self->cert_name.".pem";
$ssl_opts->{SSL_key_file} = $self->puppet_ssl_path."/private_keys/".$self->cert_name.".pem";
} else {
$req->header( 'X-Authentication' => $self->access_token );
}
my $ua = LWP::UserAgent->new( timeout => $self->timeout, ssl_opts => $ssl_opts );
my $response = $ua->request( $req );
lib/Puppet/Classify.pm view on Meta::CPAN
my $uri = "https://".$self->server_name.":".$self->server_port."/classifier-api/v1/$action";
my $req = HTTP::Request->new( 'POST', $uri );
my $ssl_opts = { verify_hostname => 1, SSL_ca_file => $self->puppet_ssl_path."/certs/ca.pem" };
if( $self->has_cert_name ){
$ssl_opts->{SSL_cert_file} = $self->puppet_ssl_path."/certs/".$self->cert_name.".pem";
$ssl_opts->{SSL_key_file} = $self->puppet_ssl_path."/private_keys/".$self->cert_name.".pem";
} else {
$req->header( 'X-Authentication' => $self->access_token );
}
my $ua = LWP::UserAgent->new( timeout => $self->timeout, ssl_opts => $ssl_opts );
$req->header( 'Content-Type' => 'application/json' );
view all matches for this distribution
view release on metacpan or search on metacpan
lib/RDF/Crypt/Decrypter.pm view on Meta::CPAN
sub decrypt_bytes
{
my ($self, $text) = @_;
$text = decode_base64($text);
my $key = $self->private_key;
my $block_size = $key->size - 16;
my $iv = substr($text, 0, $block_size);
my $removal_chars = unpack('n', substr($text, $block_size, 2));
my $scrambled = substr($text, $block_size + 2);
lib/RDF/Crypt/Decrypter.pm view on Meta::CPAN
sub encrypt_bytes
{
my ($self, $text) = @_;
encode_base64(
$self->private_key->private_encrypt($text)
);
}
1;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Rapi/Blog.pm view on Meta::CPAN
sub _enforce_valid_recaptcha_config {
my $self = shift;
my $cfg = $self->recaptcha_config or return 1; # No config at all is valid
my @valid_keys = qw/public_key private_key verify_url strict_mode/;
my %keys = map {$_=>1} @valid_keys;
for my $k (keys %$cfg) {
$keys{$k} or die join('',
"Unknown recaptcha_config param '$k' - ",
"only valid params are: ",join(', ',@valid_keys)
)
}
die "Invalid recaptcha_config - both 'public_key' and 'private_key' params are required"
unless ($cfg->{public_key} && $cfg->{private_key});
if(exists $cfg->{strict_mode}) {
my $v = $cfg->{strict_mode};
my $disp = defined $v ? "'$v'" : 'undef';
die "Bad value $disp for 'strict_mode' in recaptcha_config - must be either 1 (true) or 0 (false)\n"
lib/Rapi/Blog.pm view on Meta::CPAN
=head3 public_key
Required. The public, or "SITE KEY" provided by the Google reCAPTCHA settings, after being setup in the
Google reCAPTCHA system L<www.google.com/recaptcha/admin|http://www.google.com/recaptcha/admin>
=head3 private_key
Required. The private, or "SECRET KEY" provided by the Google reCAPTCHA settings, after being setup in the
Google reCAPTCHA system L<www.google.com/recaptcha/admin|http://www.google.com/recaptcha/admin>. Both the
C<public_key> and the C<private_key> are provided as a pair and both are required.
=head3 verify_url
Optional URL to use when performing the actual reCAPCTHA validation with Google. Defaults to
C<https://www.google.com/recaptcha/api/siteverify> which should probably never need to be changed.
view all matches for this distribution