Server IP : 85.214.239.14 / Your IP : 18.226.98.244 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /proc/3/root/usr/share/perl5/Mail/DKIM/ |
Upload File : |
package Mail::DKIM::PrivateKey; use strict; use warnings; our $VERSION = '1.20230212'; # VERSION # ABSTRACT: a private key loaded in memory for DKIM signing # Copyright 2005-2007 Messiah College. All rights reserved. # Jason Long <jlong@messiah.edu> # # Copyright (c) 2004 Anthony D. Urso. All rights reserved. # This program is free software; you can redistribute it and/or # modify it under the same terms as Perl itself. use base 'Mail::DKIM::Key'; use Carp; *calculate_EM = \&Mail::DKIM::Key::calculate_EM; sub load { my $class = shift; my %prms = @_; my $self = bless {}, $class; $self->{'TYPE'} = ( $prms{'Type'} or 'rsa' ); if ( $prms{'Data'} ) { $self->{'DATA'} = $prms{'Data'}; } elsif ( defined $prms{'File'} ) { my @data; open my $file, '<', $prms{'File'} or die "Error: cannot read $prms{File}: $!\n"; while ( my $line = <$file> ) { chomp $line; next if $line =~ /^---/; push @data, $line; } $self->{'DATA'} = join '', @data; close $file; } elsif ( $prms{'Cork'} ) { $self->{'CORK'} = $prms{'Cork'}; } else { croak 'missing required argument'; } return $self; } sub convert { use Crypt::OpenSSL::RSA; my $self = shift; $self->data or return; # have to PKCS1ify the privkey because openssl is too finicky... my $pkcs = "-----BEGIN RSA PRIVATE KEY-----\n"; for ( my $i = 0 ; $i < length $self->data ; $i += 64 ) { $pkcs .= substr $self->data, $i, 64; $pkcs .= "\n"; } $pkcs .= "-----END RSA PRIVATE KEY-----\n"; my $cork; eval { local $SIG{__DIE__}; $cork = new_private_key Crypt::OpenSSL::RSA($pkcs); 1 } || do { $self->errorstr($@); return; }; $cork or return; # segfaults on my machine # $cork->check_key or # return; $self->cork($cork); return 1; } #deprecated sub sign { my $self = shift; my $mail = shift; return $self->cork->sign($mail); } #deprecated- use sign_digest() instead sub sign_sha1_digest { my $self = shift; my ($digest) = @_; return $self->sign_digest( 'SHA-1', $digest ); } sub sign_digest { my $self = shift; my ( $digest_algorithm, $digest ) = @_; my $rsa_priv = $self->cork; $rsa_priv->use_no_padding; my $k = $rsa_priv->size; my $EM = calculate_EM( $digest_algorithm, $digest, $k ); return $rsa_priv->decrypt($EM); } __END__ =pod =encoding UTF-8 =head1 NAME Mail::DKIM::PrivateKey - a private key loaded in memory for DKIM signing =head1 VERSION version 1.20230212 =head1 SYNOPSIS my $key1 = Mail::DKIM::PrivateKey->load( File => '/path/to/private.key'); my $key2 = Mail::DKIM::PrivateKey->load( Data => $base64); # use the loaded key in a DKIM signing object my $dkim = Mail::DKIM::Signer->new( Key => $key2, ); =head1 CONSTRUCTOR =head2 load() - loads a private key into memory my $key1 = Mail::DKIM::PrivateKey->load( File => '/path/to/private.key'); Loads the Base64-encoded key from the specified file. my $key2 = Mail::DKIM::PrivateKey->load(Data => $base64); Loads the Base64-encoded key from a string already in memory. my $key3 = Mail::DKIM::PrivateKey->load(Cork => $openssl_object); Creates a Mail::DKIM::PrivateKey wrapper object for the given OpenSSL key object. The key object should be of type L<Crypt::OpenSSL::RSA>. =head1 METHODS =head2 cork() - access the underlying OpenSSL key object $openssl_object = $key->cork; The returned object is of type L<Crypt::OpenSSL::RSA>. =head2 sign_digest() Cryptographically sign the given message digest. $key->sign_digest('SHA-1', sha1('my message text')); The first parameter is the name of the digest: one of "SHA-1", "SHA-256". The second parameter is the message digest as a binary string. The result should be the signed digest as a binary string. 1; =head1 AUTHORS =over 4 =item * Jason Long <jason@long.name> =item * Marc Bradshaw <marc@marcbradshaw.net> =item * Bron Gondwana <brong@fastmailteam.com> (ARC) =back =head1 THANKS Work on ensuring that this module passes the ARC test suite was generously sponsored by Valimail (https://www.valimail.com/) =head1 COPYRIGHT AND LICENSE =over 4 =item * Copyright (C) 2013 by Messiah College =item * Copyright (C) 2010 by Jason Long =item * Copyright (C) 2017 by Standcore LLC =item * Copyright (C) 2020 by FastMail Pty Ltd =back This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself, either Perl version 5.8.6 or, at your option, any later version of Perl 5 you may have available. =cut