view release on metacpan or search on metacpan
"Alien::Build::Plugin::Gather::IsolateDynamic" : "0.48",
"Alien::cmake3" : "0.02",
"Archive::Tar" : "0",
"Config" : "0",
"HTTP::Tiny" : "0.044",
"IO::Socket::SSL" : "1.56",
"IO::Zlib" : "0",
"Mojo::DOM" : "0",
"Mojolicious" : "7.00",
"Mozilla::CA" : "0",
"Net::SSLeay" : "1.49",
view all matches for this distribution
view release on metacpan or search on metacpan
"File::HomeDir" : "0",
"File::Spec" : "0",
"Getopt::Long::Descriptive" : "0.084",
"HTTP::Tiny::Multipart" : "0",
"HTTP::Tiny::UA" : "0",
"IO::Socket::SSL" : "1.56",
"Net::SSLeay" : "1.49",
"Term::ReadKey" : "0",
"URI" : "0",
"constant" : "0",
"strict" : "0",
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Amazon/CloudFront/Thin.pm view on Meta::CPAN
B<Receives>: hashref with options.
B<Returns>: Amazon::CloudFront::Thin object.
use Amazon::CloudFront::Thin;
use IO::Socket::SSL;
use Furl;
my $cloudfront = Amazon::CloudFront::Thin->new(
aws_access_key_id => 'my_key_id',
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Any/Daemon/HTTP.pm view on Meta::CPAN
my $proto = $self->{ADH_protocol}
= $args{protocol} || ($port==PORT_HTTPS ? 'HTTPS' : 'HTTP');
my $sock_class;
if($proto eq 'HTTPS')
{ $sock_class = 'IO::Socket::SSL';
eval "require IO::Socket::SSL; require HTTP::Daemon::SSL" or panic $@;
}
elsif($proto eq 'HTTP')
{ $sock_class = 'IO::Socket::IP';
}
elsif($proto eq 'FCGI')
lib/Any/Daemon/HTTP.pm view on Meta::CPAN
{ $args->{socket} = $client;
$conn = Any::Daemon::FCGI::ClientConn->new($args);
}
else
{ # Ugly hack, steal HTTP::Daemon's HTTP/1.1 implementation
$conn = bless $client, $client->isa('IO::Socket::SSL')
? 'HTTP::Daemon::ClientConn::SSL'
: 'HTTP::Daemon::ClientConn';
${*$conn}{httpd_daemon} = $self;
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/SlackBot.pm view on Meta::CPAN
use HTTP::Request::Common qw(POST);
use AnyEvent::HTTP::MultiGet;
use AnyEvent::WebSocket::Client;
use JSON;
use namespace::clean;
use IO::Socket::SSL;
our $VERSION='1.0005';
BEGIN {
no namespace::clean;
with 'Log::LogMethods','Data::Result::Moo';
lib/AnyEvent/SlackBot.pm view on Meta::CPAN
sub connect_and_run {
my ($self)=@_;
my $request=POST $self->rtm_start_url,[token=>$self->token];
my $ua=LWP::UserAgent->new;
$ua->ssl_opts(
SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_NONE,
SSL_hostname => '',
verify_hostname => 0
);
my $response=$ua->request($request);
$self->{timer}=undef;
view all matches for this distribution
view release on metacpan or search on metacpan
* Adding better error handling for malformatted JSON in start and in
handling incoming WebSocket messages. HT: robn
0.152750 2015-10-02 13:28:35CDT-0500 America/Chicago
* Adding IO::Socket::SSL as a prereq. HT: shoichikaji
0.152660 2015-09-23 10:39:17CDT-0500 America/Chicago
* Fixed the SYNOPSIS code. HT: robn
* Removed the dependency on AIO. HT: robn
view all matches for this distribution
view release on metacpan or search on metacpan
"Exporter" : "5.72",
"HTTP::MultiGet" : "1.008",
"HTTP::Request" : "6.13",
"HTTP::Request::Common" : "6.13",
"IO::Scalar" : "2.111",
"IO::Socket::SSL" : "1.968",
"JSON" : "2.90",
"LWP::UserAgent" : "6.26",
"Log::Dispatch::Handle" : "2.65",
"Log::Log4perl" : "1.49",
"Log::LogMethods" : "1.0",
view all matches for this distribution
view release on metacpan or search on metacpan
}
},
"runtime" : {
"recommends" : {
"EV" : "0",
"IO::Socket::SSL" : "0",
"Math::Random::Secure" : "0",
"Net::SSLeay" : "0",
"PerlX::Maybe::XS" : "0"
},
"requires" : {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/TLS.pm view on Meta::CPAN
This can be implemented by specifying a callback that has to verify that
the actual C<$peername> matches the given certificate in C<$cert>.
Since this can be rather hard to implement, AnyEvent::TLS offers a variety
of predefined "schemes" (lifted from L<IO::Socket::SSL>) that are named
like the protocols that use them:
=over 4
=item ldap (rfc4513), pop3,imap,acap (rfc2995), nntp (rfc4642)
lib/AnyEvent/TLS.pm view on Meta::CPAN
our %CN_SCHEME = (
# each tuple is [$cn_wildcards, $alt_wildcards, $check_cn]
# where *_wildcards is 0 for none allowed, 1 for allowed at beginning and 2 for allowed everywhere
# and check_cn is 0 for do not check, 1 for check when no alternate dns names and 2 always
# all of this is from IO::Socket::SSL
rfc4513 => [0, 1, 2],
rfc2818 => [0, 2, 1],
rfc3207 => [0, 0, 2], # see IO::Socket::SSL, rfc seems unclear
none => [], # do not check
ldap => "rfc4513", ldaps => "ldap",
http => "rfc2818", https => "http",
smtp => "rfc3207", smtps => "smtp",
lib/AnyEvent/TLS.pm view on Meta::CPAN
}
$cn =~ $pattern
}
# taken verbatim from IO::Socket::SSL, then changed to take advantage of
# AnyEvent utilities.
sub verify_hostname($$$) {
my ($cn, $cert, $scheme) = @_;
while (!ref $scheme) {
lib/AnyEvent/TLS.pm view on Meta::CPAN
Marc Lehmann <schmorp@schmorp.de>.
Some of the API, documentation and implementation (verify_hostname),
and a lot of ideas/workarounds/knowledge have been taken from the
L<IO::Socket::SSL> module. Care has been taken to keep the API similar to
that and other modules, to the extent possible while providing a sensible
API for AnyEvent.
=cut
view all matches for this distribution
view release on metacpan or search on metacpan
"HTML::Escape" : "0",
"HTML::Selector::XPath" : "0",
"HTML::TreeBuilder::XPath" : "0",
"HTTP::Date" : "0",
"HTTP::Tiny" : "0",
"IO::Socket::SSL" : "0",
"Path::Tiny" : "0.125",
"Text::Xslate" : "0",
"URI" : "0",
"UUID" : "0",
"perl" : "5.024"
view all matches for this distribution
view release on metacpan or search on metacpan
AuthNetLDAP.pm view on Meta::CPAN
=item PerlSetVar UseStartTLS
Optional; can be yes or no. If yes, will fail unless can start a TLS
encrypted connection to the LDAP server before sending passwords over
the network. Note that this requires that the optional module
IO::Socket::SSL is installed; this depends on Net::SSLeay, which
depends on openssl. Of course, the LDAP server must support Start TLS
also.
=back
AuthNetLDAP.pm view on Meta::CPAN
#PerlSetVar BindPWD "password" #optional
PerlSetVar BaseDN "ou=people,o=acme.com"
PerlSetVar LDAPServer ldap.acme.com
PerlSetVar LDAPPort 389
PerlSetVar UIDAttr uid
PerlSetVar UseStartTLS yes # Assuming you installed IO::Socket::SSL, etc.
# Set if you want base or one level scope for search:
PerlSetVar SearchScope one # default is sub
# Set if you want to limit access to a subset of users:
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache/SdnFw/tt/install.txt view on Meta::CPAN
o conf prerequisites_policy follow
o conf build_requires_install_policy yes
o conf commit
cpan -i LDS/Crypt-CBC-2.12.tar.gz Crypt::Blowfish XML::Dumper \
IO::Socket::SSL Net::SMTP::SSL Authen::SASL Template \
DateTime::Locale IO::Socket::INET Net::IMAP::Simple XML::Simple \
Lingua::EN::Numbers Google::SAML::Response
# Generally you don't need to install mysql, only if you need wordpress
yum -y install mysql-devel.x86_64 mysql-server.x86_64 mysql.x86_64
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache/Session/Browseable/Store/LDAP.pm view on Meta::CPAN
) or die( 'Unable to connect to ' . join( ' ', @servers ) . ": " . $@ );
# Check SSL error for old Net::LDAP versions
if ( $Net::LDAP::VERSION < '0.64' ) {
# CentOS7 has a bug in which IO::Socket::SSL will return a broken
# socket when certificate validation fails. Net::LDAP does not catch
# it, and the process ends up crashing.
# As a precaution, make sure the underlying socket is doing fine:
if ( $ldap->socket->isa('IO::Socket::SSL')
and $ldap->socket->errstr < 0 )
{
die( "SSL connection error: " . $ldap->socket->errstr );
}
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache/Session/Store/LDAP.pm view on Meta::CPAN
) or die( 'Unable to connect to ' . join( ' ', @servers ) . ': ' . $@ );
# Check SSL error for old Net::LDAP versions
if ( $Net::LDAP::VERSION < '0.64' ) {
# CentOS7 has a bug in which IO::Socket::SSL will return a broken
# socket when certificate validation fails. Net::LDAP does not catch
# it, and the process ends up crashing.
# As a precaution, make sure the underlying socket is doing fine:
if ( $ldap->socket->isa('IO::Socket::SSL')
and $ldap->socket->errstr < 0 )
{
die( "SSL connection error: " . $ldap->socket->errstr );
}
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache/Test.pm view on Meta::CPAN
}
}
sub need_ssl {
my $vars = vars();
need_module([$vars->{ssl_module_name}, 'IO::Socket::SSL']);
}
sub need_lwp {
require Apache::TestRequest;
if (Apache::TestRequest::has_lwp()) {
view all matches for this distribution
view release on metacpan or search on metacpan
Wyrd/Services/Auth.pm view on Meta::CPAN
my ($key, $ticket) = $self->generate_ticket;
#Send that pair to the Login Server
$key_url = 'https://' . $req->hostname . $key_url unless ($key_url =~ /^https?:\/\//i);
if ($key_url =~ /^https:\/\//i) {
eval('use IO::Socket::SSL');
die "LWP::UserAgent needs to support SSL to use a login server over https. Install IO::Socket::SSL and make sure it works."
if ($@);
}
my $ua = LWP::UserAgent->new;
$ua->timeout(60);
my $response = $ua->request(POST $key_url,
Wyrd/Services/Auth.pm view on Meta::CPAN
my $status = $response->status_line;
#If the key can't be saved on the login server, send regrets and close
if ($status !~ /200|OK/) {
if ($status =~ /Invalid argument/i) {
$debug && warn ("You may need to Update IO::Socket::SSL");
} else {
$debug && warn ("Login Server status was $status");
}
my $failed_url = $req->dir_config('LSDownURL');
$failed_url = $scheme . '://' . $req->hostname . $port . $failed_url unless ($failed_url =~ /^http/i);
view all matches for this distribution
view release on metacpan or search on metacpan
t/lib/Test/Apache2/API.pm view on Meta::CPAN
Apache::TestRequest::user_agent(reset => 1, keep_alive => 1 );
my $ua = Apache::TestRequest->new;
# To get the fingerprint for the certificate in ./t/server.crt, do:
# echo "sha1\$$(openssl x509 -noout -in ./t/server.crt -fingerprint -sha1|perl -pE 's/^.*Fingerprint=|(\w{2})(?:\:?|$)/$1/g')"
$ua->ssl_opts(
# SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_NONE,
# SSL_verify_mode => 0x00
# verify_hostname => 0,
SSL_fingerprint => 'sha1$DEE8650E44870896E821AAE4A5A24382174D100E',
# SSL_version => 'SSLv3',
# SSL_verfifycn_name => 'localhost',
view all matches for this distribution
view release on metacpan or search on metacpan
AuthNetLDAP.pm view on Meta::CPAN
=item PerlSetVar UseStartTLS
Optional; can be yes or no. If yes, will fail unless can start a TLS
encrypted connection to the LDAP server before sending passwords over
the network. Note that this requires that the optional module
IO::Socket::SSL is installed; this depends on Net::SSLeay, which
depends on openssl. Of course, the LDAP server must support Start TLS
also.
=back
AuthNetLDAP.pm view on Meta::CPAN
#PerlSetVar BindPWD "password" #optional
PerlSetVar BaseDN "ou=people,o=acme.com"
PerlSetVar LDAPServer ldap.acme.com
PerlSetVar LDAPPort 389
PerlSetVar UIDAttr uid
PerlSetVar UseStartTLS yes # Assuming you installed IO::Socket::SSL, etc.
# Set if you want base or one level scope for search:
PerlSetVar SearchScope one # default is sub
# Set if you want to limit access to a subset of users:
view all matches for this distribution
view release on metacpan or search on metacpan
[Patch]
* Fixing work with perl 5.14
1.0.2 2014-11-15
[Patch]
* Added dependency IO::Socket::SSL
1.0.3 2015-02-28
[Patch]
* Fixing dependencies
* Using lowercase namespace and name in `get_github_favorites`
view all matches for this distribution
view release on metacpan or search on metacpan
'Future::AsyncAwait' => '0',
'Getopt::Long' => '0',
'HTTP::Tinyish' => '0',
'IO::Async' => '0',
'IO::Async::SSL' => '0',
'IO::Socket::SSL' => '0',
'IPC::Run3' => '0',
'Inline' => '0',
'Inline::C' => '0',
'JSON::MaybeXS' => '0',
'List::AllUtils' => '0',
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/CLI/Plugin/Net/SMTP.pm view on Meta::CPAN
}
if( (exists $ENV{APPCLI_SMTP_STARTTLS} && defined $ENV{APPCLI_SMTP_STARTTLS}) ||
(exists $smtp_option->{StartTLS} && defined $smtp_option->{StartTLS}) ||
(exists $self->{starttls} && defined $self->{starttls}) ){
require IO::Socket::SSL;
unshift @Net::SMTP::ISA, "IO::Socket::SSL";
}
$self->smtp(Net::SMTP->new(%{$smtp_option}) or die $!);
}
=head2 smtp
return Net::SMTP object. Environment variable APPCLI_SMTP_STARTTLS, net_smtp to StartTLS, the script runs starttls option, you specify one, IO::Socket::SSL If you have installed on your system, SMTPS can make a connection with.
But even then one way, net_smtp option of the Port is defined as SMTPS to specify the port number
Example1 APPCLI_SMTP_STARTTLS:
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/CamelPKI/SysV/Apache.pm view on Meta::CPAN
my $phpinfo = LWP::Simple::get
("https://localhost:12345/t/php/phpinfo.php");
like($phpinfo, qr/www\.php\.net/);
};
use IO::Socket::SSL;
use LWP::UserAgent;
use App::CamelPKI::Test qw(http_request_prepare http_request_execute);
test "SSL client w/ certificate" => sub {
my $webserver = App::CamelPKI::SysV::Apache->load($directory);
unless ($webserver->test_php_directory) {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/DubiousHTTP/TestServer.pm view on Meta::CPAN
sub run {
shift;
my ($addr,$sslargs,$response) = @_;
if ($sslargs) {
# XXX do we need a specific minimal version?
eval { require IO::Socket::SSL } or
die "need IO::Socket::SSL for SSL support";
$sslargs = eval { IO::Socket::SSL::SSL_Context->new( SSL_server => 1, %$sslargs) }
or die "creating SSL context: $@";
}
my $srv = $IOCLASS->new( LocalAddr => $addr, Listen => 10, ReuseAddr => 1 )
or die "listen failed: $!";
$srv->blocking(0);
lib/App/DubiousHTTP/TestServer.pm view on Meta::CPAN
}
# assume GET|POST if only uppercase word characters
return _install_http($cl,$response) if $buf =~m{^[A-Z]+$};
# initiate TLS handshake
if (!IO::Socket::SSL->start_SSL($cl,
SSL_startHandshake => 0,
SSL_server => 1,
SSL_reuse_ctx => $sslctx
)) {
warn "sslify failed: $IO::Socket::SSL::SSL_ERROR";
delete_client($cl);
return;
}
return _install_https($cl,$response);
});
lib/App/DubiousHTTP/TestServer.pm view on Meta::CPAN
my $cl = shift;
if ($cl->accept_SSL) {
# handshake finally done
return _install_http($cl,$response,'https');
}
if ($IO::Socket::SSL::SSL_ERROR == IO::Socket::SSL::SSL_WANT_READ()) {
$SELECT->mask($cl, 0 => 1, 1 => 0);
} elsif ($IO::Socket::SSL::SSL_ERROR == IO::Socket::SSL::SSL_WANT_WRITE()) {
$SELECT->mask($cl, 0 => 0, 1 => 1);
} else {
warn "sslify failed: $IO::Socket::SSL::SSL_ERROR";
delete_client($cl);
return;
}
};
$SELECT->handler($cl, 0 => $handler, 1 => $handler);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/EC2Cssh.pm view on Meta::CPAN
=cut
use autodie qw/:all/;
use Cwd;
use File::Spec;
use IO::Socket::SSL;
use Net::Amazon::EC2;
use Safe;
use Text::Template;
use IO::Pipe;
lib/App/EC2Cssh.pm view on Meta::CPAN
sub _build_ec2{
my ($self) = @_;
# Hack so we never verify Amazon's host. Whilst still keeping HTTPS
IO::Socket::SSL::set_defaults( SSL_verify_callback => sub{ return 1; } );
my $ec2 = Net::Amazon::EC2->new({ %{ $self->config()->{ec2_config} || die "No ec2_config in config\n" } , ssl => 1 } );
return $ec2;
}
sub main{
view all matches for this distribution
view release on metacpan or search on metacpan
Thanks to cpanm, this is quite easier these days: it can actually do
what's needed with a single command:
# on the machine connected to the Internet or to a minicpan
$ cpanm -L xxx --scandeps --save-dists dists \
Mojolicious Mojolicious::Plugin::Authentication IO::Socket::SSL ...
which places all the modules in subdirectory dists (thanks to option
--save-dists) with an arrangement similar to what you would expect from
a CPAN mirror.
you with a subdirectory that is ready for deployment, with all the bits
in place to push automation as much as possible. So you can do this:
# on the machine connected to the Internet or to a minicpan
$ epan create Mojolicious Mojolicious::Plugin::Authentication \
IO::Socket::SSL ...
$ tar cvzf epan.tar.gz epan
transfer dists.tar.gz to the target machine and...
# on the target machine
view all matches for this distribution
view release on metacpan or search on metacpan
cpanfile.snapshot view on Meta::CPAN
ExtUtils::MakeMaker 0
perl 5.008
IO-Socket-SSL-2.098
pathname: S/SU/SULLR/IO-Socket-SSL-2.098.tar.gz
provides:
IO::Socket::SSL 2.098
IO::Socket::SSL::Intercept 2.056
IO::Socket::SSL::OCSP_Cache 2.098
IO::Socket::SSL::OCSP_Resolver 2.098
IO::Socket::SSL::PublicSuffix undef
IO::Socket::SSL::SSL_Context 2.098
IO::Socket::SSL::SSL_HANDLE 2.098
IO::Socket::SSL::Session_Cache 2.098
IO::Socket::SSL::Trace 2.098
IO::Socket::SSL::Utils 2.015
requirements:
ExtUtils::MakeMaker 0
Net::SSLeay 1.46
Scalar::Util 0
IPC-Run-20250809.0
cpanfile.snapshot view on Meta::CPAN
provides:
LWP::Protocol::https 6.14
LWP::Protocol::https::Socket 6.14
requirements:
ExtUtils::MakeMaker 0
IO::Socket::SSL 1.970
LWP::Protocol::http 0
LWP::UserAgent 6.06
Net::HTTPS 6
base 0
perl 5.008001
view all matches for this distribution
view release on metacpan or search on metacpan
- fixed disabling testing for Windows platform
0.1.14 2022-07-21 15:28
- Added IO::Socket::SSL as requirement for installation/testing
0.1.13 2022-07-21 14:17
- updated version to 0.1.13
- updated ChangeLog
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/HTTP_Proxy_IMP.pm view on Meta::CPAN
use App::HTTP_Proxy_IMP::Relay;
use AnyEvent;
use Getopt::Long qw(:config posix_default bundling);
use App::HTTP_Proxy_IMP::Debug qw(debug $DEBUG $DEBUG_RX);
use Net::Inspect::Debug qw(%TRACE);
use IO::Socket::SSL::Intercept;
use IO::Socket::SSL::Utils;
use Carp 'croak';
use POSIX '_exit';
# try IPv6 using IO::Socket::IP or IO::Socket::INET6
lib/App/HTTP_Proxy_IMP.pm view on Meta::CPAN
$e->{atime} = time();
return ($e->{cert},$e->{key});
};
}
$mitm = IO::Socket::SSL::Intercept->new(
proxy_cert_file => $f,
proxy_key_file => $f,
cache => $cache,
serial => $serial,
);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MechaCPAN.pm view on Meta::CPAN
sub _https_blacklist
{
require Module::Load::Conditional;
state $can_https
= Module::Load::Conditional::can_load( modules => 'IO::Socket::SSL' );
if ( !$can_https )
{
return qw/lwp httptiny httplite/;
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Midgen/Role/Eval.pm view on Meta::CPAN
# PPI::Structure::Block { ... }
# PPI::Token::Whitespace ' '
# PPI::Statement::Include
# PPI::Token::Word 'require'
# PPI::Token::Whitespace ' '
# PPI::Token::Word 'IO::Socket::SSL'
# PPI::Token::Structure ';'
# PPI::Token::Whitespace ' '
# PPI::Statement
# PPI::Token::Word 'IO::Socket::SSL'
# PPI::Token::Operator '->'
# PPI::Token::Word 'VERSION'
# PPI::Structure::List ( ... )
# PPI::Statement::Expression
# PPI::Token::Number::Float '1.44'
view all matches for this distribution