view release on metacpan or search on metacpan
lib/APNS/Agent.pm view on Meta::CPAN
use Class::Accessor::Lite::Lazy 0.03 (
new => 1,
ro => [qw/
certificate
private_key
sandbox
debug_port
/],
ro_lazy => {
on_error_response => sub {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AWS/Signature4.pm view on Meta::CPAN
=head1 METHODS
=over 4
=item $signer = AWS::Signature4->new(-access_key => $account_id,-secret_key => $private_key);
Create a signing object using your AWS account ID and secret key. You
may also use the temporary security tokens received from Amazon's STS
service, either by passing the access and secret keys derived from the
token, or by passing a VM::EC2::Security::Token produced by the
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Acme/JWT.pm view on Meta::CPAN
sub sign_rsa {
my $self = shift;
my ($algo, $key, $msg) = @_;
$algo =~ s/\D+//;
my $private_key = Crypt::OpenSSL::RSA->new_private_key($key);
$private_key->can("use_sha${algo}_hash")->($private_key);
$private_key->sign($msg);
}
sub verify_rsa {
my $self = shift;
my ($algo, $key, $signing_input, $signature) = @_;
view all matches for this distribution
view release on metacpan or search on metacpan
corpus/vcpkg/r2/installed/vcpkg/info/openssl-windows_1.1.1d-1_x64-windows.list view on Meta::CPAN
x64-windows/debug/html/man3/EC_KEY_dup.html
x64-windows/debug/html/man3/EC_KEY_free.html
x64-windows/debug/html/man3/EC_KEY_generate_key.html
x64-windows/debug/html/man3/EC_KEY_get0_engine.html
x64-windows/debug/html/man3/EC_KEY_get0_group.html
x64-windows/debug/html/man3/EC_KEY_get0_private_key.html
x64-windows/debug/html/man3/EC_KEY_get0_public_key.html
x64-windows/debug/html/man3/EC_KEY_get_conv_form.html
x64-windows/debug/html/man3/EC_KEY_get_enc_flags.html
x64-windows/debug/html/man3/EC_KEY_get_ex_data.html
x64-windows/debug/html/man3/EC_KEY_get_ex_new_index.html
view all matches for this distribution
view release on metacpan or search on metacpan
t/ansible-test1/ansible.cfg view on Meta::CPAN
# list any Jinja2 extensions to enable here:
#jinja2_extensions = jinja2.ext.do,jinja2.ext.i18n
# if set, always use this private key file for authentication, same as
# if passing --private-key to ansible or ansible-playbook
#private_key_file = /path/to/file
# If set, configures the path to the Vault password file as an alternative to
# specifying --vault-password-file on the command line.
#vault_password_file = /path/to/vault_password_file
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/APNS.pm view on Meta::CPAN
is => 'rw',
isa => 'Str | ScalarRef',
required => 1,
);
has private_key => (
is => 'rw',
isa => 'Str | ScalarRef',
required => 1,
);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache/TS/AdminClient.pm view on Meta::CPAN
proxy.config.ssl.client.CA.cert.filename
proxy.config.ssl.client.CA.cert.path
proxy.config.ssl.client.cert.filename
proxy.config.ssl.client.certification_level
proxy.config.ssl.client.cert.path
proxy.config.ssl.client.private_key.filename
proxy.config.ssl.client.private_key.path
proxy.config.ssl.client.verify.server
proxy.config.ssl.cswift.lib.path
proxy.config.ssl.enabled
proxy.config.ssl.ncipher.lib.path
proxy.config.ssl.number.threads
proxy.config.ssl.server.cert_chain.filename
proxy.config.ssl.server.cert.filename
proxy.config.ssl.server.cert.path
proxy.config.ssl.server.multicert.filename
proxy.config.ssl.server_port
proxy.config.ssl.server.private_key.filename
proxy.config.ssl.server.private_key.path
proxy.config.stack_dump_enabled
proxy.config.start_script
proxy.config.stat_collector.interval
proxy.config.stat_collector.port
proxy.config.stats.config_file
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache/TestSSLCA.pm view on Meta::CPAN
database = $db # database index file.
serial = serial # The current serial number
certificate = $cacert # The CA certificate
crl = $cacrl # The current CRL
private_key = $cakey # The private key
default_days = 365 # how long to certify for
default_crl_days = 365 # how long before next CRL
default_md = $dgst # which md to use.
preserve = no # keep passed DN ordering
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Acmeman.pm view on Meta::CPAN
unless ($self->{_account_key}) {
my $keyfile = $self->cf->get('account', 'key');
if (-r $keyfile) {
if (open(my $fh, '<', $keyfile)) {
local $/ = undef;
$self->{_account_key} = Crypt::OpenSSL::RSA->new_private_key(<$fh>);
close $fh;
} else {
error("can't open $keyfile for reading: $!");
}
} else {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/CamelPKI/CA.pm view on Meta::CPAN
$template->prepare_certificate
($self->certificate, $cert, %templateopts);
$cert->set_serial(sprintf("0x%x",
$self->{db}->next_serial("certificate")));
$cert = App::CamelPKI::Certificate->parse
($cert->sign($self->_private_key,
$template->signature_hash));
push @{$self->{signed}}, { cert => $cert, opts => \%dbopts };
return;
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/GroupSecret.pm view on Meta::CPAN
my $filepath = '';
my $help = 0;
my $man = 0;
my $version = 0;
my $private_key = '';
# Parse options using pass_through so that we can pick out the global
# options, wherever they are in the arg list, and leave the rest to be
# parsed by each individual command.
Getopt::Long::Configure('pass_through');
GetOptionsFromArray(
\@args,
'file|f=s' => \$filepath,
'help|h|?' => \$help,
'manual|man' => \$man,
'private-key|k=s' => \$private_key,
'version|v' => \$version,
) or pod2usage(2);
Getopt::Long::Configure('default');
pod2usage(-exitval => 1, -verbose => 99, -sections => [qw(SYNOPSIS OPTIONS COMMANDS)]) if $help;
pod2usage(-verbose => 2) if $man;
return print "groupsecret ${VERSION}\n" if $version;
$self->{private_key} = $private_key if $private_key;
$self->{filepath} = $filepath if $filepath;
my %commands = (
add_key => 'add_key',
add_keys => 'add_key',
view all matches for this distribution
view release on metacpan or search on metacpan
public/javascripts/ace/mode-php.js view on Meta::CPAN
openssl_csr_new|openssl_csr_sign|openssl_decrypt|openssl_dh_compute_key|openssl_digest|openssl_encrypt|openssl_error_string|\
openssl_free_key|openssl_get_cipher_methods|openssl_get_md_methods|openssl_get_privatekey|openssl_get_publickey|openssl_open|\
openssl_pkcs12_export|openssl_pkcs12_export_to_file|openssl_pkcs12_read|openssl_pkcs7_decrypt|openssl_pkcs7_encrypt|openssl_pkcs7_sign|\
openssl_pkcs7_verify|openssl_pkey_export|openssl_pkey_export_to_file|openssl_pkey_free|openssl_pkey_get_details|openssl_pkey_get_private|\
openssl_pkey_get_public|openssl_pkey_new|openssl_private_decrypt|openssl_private_encrypt|openssl_public_decrypt|openssl_public_encrypt|\
openssl_random_pseudo_bytes|openssl_seal|openssl_sign|openssl_verify|openssl_x509_check_private_key|openssl_x509_checkpurpose|\
openssl_x509_export|openssl_x509_export_to_file|openssl_x509_free|openssl_x509_parse|openssl_x509_read|ord|outeriterator|\
outofboundsexception|outofrangeexception|output_add_rewrite_var|output_reset_rewrite_vars|overflowexception|overload|override_function|\
ovrimos_close|ovrimos_commit|ovrimos_connect|ovrimos_cursor|ovrimos_exec|ovrimos_execute|ovrimos_fetch_into|ovrimos_fetch_row|\
ovrimos_field_len|ovrimos_field_name|ovrimos_field_num|ovrimos_field_type|ovrimos_free_result|ovrimos_longreadlen|ovrimos_num_fields|\
ovrimos_num_rows|ovrimos_prepare|ovrimos_result|ovrimos_result_all|ovrimos_rollback|pack|parentiterator|parse_ini_file|parse_ini_string|\
view all matches for this distribution
view release on metacpan or search on metacpan
lib/sqitch-authentication.pod view on Meta::CPAN
L<the instructions|https://docs.snowflake.com/en/user-guide/snowsql-start.html#using-key-pair-authentication>
to create a key pair, then set the following variables in the F<~/.snowsql/config>
file:
authenticator = SNOWFLAKE_JWT
private_key_path = "path/to/privatekey.p8"
To connect, set the C<$SNOWSQL_PRIVATE_KEY_PASSPHRASE> environment variable to
the passphrase for the private key, and add these parameters to the query part
of your connection URI:
view all matches for this distribution
view release on metacpan or search on metacpan
if ($h) {
print "$desc\n$usage";
exit;
}
my $private_key_path = $k || "";
# put built-in commands into a hash
my %Builtins;
while (<DATA>) {
my ($name, $cmd) = split ' ', $_, 2;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apple/AppStoreConnect.pm view on Meta::CPAN
use Apple::AppStoreConnect;
my $asc = Apple::AppStoreConnect->new(
issuer => $API_key_issuer, # API key issuer ID
key_id => $key_id, # App Store Connect API key ID
key => $private_key # Encrypted private key (PEM)
);
# Custom API request
my $res = $asc->get(url => $url);
view all matches for this distribution
view release on metacpan or search on metacpan
Password => "",
Verbosity => 0
) or die $rsa->errstr();
my $private_str=private_key_to_string($private);
$private_str="private,".$private_str;
my $cipher=new Aut::Crypt($pass);
$private_str=$cipher->encrypt($private_str);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Authen/HTTP/Signature/Method/RSA.pm view on Meta::CPAN
=cut
sub sign {
my $self = shift;
my $key = Crypt::OpenSSL::RSA->new_private_key($self->key);
confess "I don't have a key!" unless $key;
$self->_set_digest($key);
my $s = $key->sign($self->data);
view all matches for this distribution
view release on metacpan or search on metacpan
eg/mod_auth_pubtkt.pl view on Meta::CPAN
sub parse_command_line;
sub show_help;
sub show_version;
my $private_key_file;
my $public_key_file;
my $key_type;
my $ticket;
my $username = $ENV{USER};
my $ip = "127.0.0.1";
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Bitcoin/Crypto/BIP44.pm view on Meta::CPAN
# stringifies automatically
say "$path";
# can be used in key derivation
$ext_private_key->derive_key($path);
=head1 DESCRIPTION
This class is a helper for constructing BIP44-compilant key derivation paths.
BIP44 describes the mechanism the HD (Hierarchical Deterministic) wallets use
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Blockchain/Ethereum/Keystore.pm view on Meta::CPAN
...
);
my $keyfile = Blockchain::Ethereum::Keystore::Keyfile->new;
$keyfile->import_file("...");
$keyfile->private_key->sign_transaction($transaction);
Export private key:
my $keyfile = Blockchain::Ethereum::Keystore::Keyfile->new;
$keyfile->import_file("...");
# private key bytes
print $keyfile->private_key->export;
=head1 OVERVIEW
This module provides a collection of Ethereum wallet management utilities.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Blockchain/Ethereum/Transaction.pm view on Meta::CPAN
chain_id => '0x539'
);
# github.com/refeco/perl-ethereum-keystore
my $key = Blockchain::Ethereum::Keystore::Key->new(
private_key => pack "H*",
'4646464646464646464646464646464646464646464646464646464646464646'
);
$key->sign_transaction($transaction);
view all matches for this distribution