|  line  | 
 stmt  | 
 bran  | 
 cond  | 
 sub  | 
 pod  | 
 time  | 
 code  | 
| 
1
 | 
  
 
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 package Mail::DKIM::PublicKey;  | 
| 
2
 | 
14
 | 
 
 | 
 
 | 
  
14
  
 | 
 
 | 
91
 | 
 use strict;  | 
| 
 
 | 
14
 | 
 
 | 
 
 | 
 
 | 
 
 | 
35
 | 
    | 
| 
 
 | 
14
 | 
 
 | 
 
 | 
 
 | 
 
 | 
389
 | 
    | 
| 
3
 | 
14
 | 
 
 | 
 
 | 
  
14
  
 | 
 
 | 
88
 | 
 use warnings;  | 
| 
 
 | 
14
 | 
 
 | 
 
 | 
 
 | 
 
 | 
27
 | 
    | 
| 
 
 | 
14
 | 
 
 | 
 
 | 
 
 | 
 
 | 
665
 | 
    | 
| 
4
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 our $VERSION = '1.20230212'; # VERSION  | 
| 
5
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # ABSTRACT: Represents a DKIM key  | 
| 
6
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
7
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # Copyright 2005 Messiah College. All rights reserved.  | 
| 
8
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # Jason Long   | 
| 
9
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
10
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # Copyright (c) 2004 Anthony D. Urso. All rights reserved.  | 
| 
11
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # This program is free software; you can redistribute it and/or  | 
| 
12
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # modify it under the same terms as Perl itself.  | 
| 
13
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
14
 | 
14
 | 
 
 | 
 
 | 
  
14
  
 | 
 
 | 
108
 | 
 use base ( 'Mail::DKIM::KeyValueList', 'Mail::DKIM::Key' );  | 
| 
 
 | 
14
 | 
 
 | 
 
 | 
 
 | 
 
 | 
30
 | 
    | 
| 
 
 | 
14
 | 
 
 | 
 
 | 
 
 | 
 
 | 
6309
 | 
    | 
| 
15
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 *calculate_EM = \&Mail::DKIM::Key::calculate_EM;  | 
| 
16
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
17
 | 
14
 | 
 
 | 
 
 | 
  
14
  
 | 
 
 | 
6118
 | 
 use Mail::DKIM::DNS;  | 
| 
 
 | 
14
 | 
 
 | 
 
 | 
 
 | 
 
 | 
148
 | 
    | 
| 
 
 | 
14
 | 
 
 | 
 
 | 
 
 | 
 
 | 
21712
 | 
    | 
| 
18
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
19
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub new {  | 
| 
20
 | 
358
 | 
 
 | 
 
 | 
  
358
  
 | 
  
0
  
 | 
542
 | 
     my $type = shift;  | 
| 
21
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
640
 | 
     my %prms = @_;  | 
| 
22
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
23
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
616
 | 
     my $self = {};  | 
| 
24
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
25
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
801
 | 
     $self->{'GRAN'} = $prms{'Granularity'};  | 
| 
26
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
618
 | 
     $self->{'NOTE'} = $prms{'Note'};  | 
| 
27
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
604
 | 
     $self->{'TEST'} = $prms{'Testing'};  | 
| 
28
 | 
358
 | 
 
 | 
  
 50
  
 | 
 
 | 
 
 | 
1321
 | 
     $self->{'TYPE'} = ( $prms{'Type'} or 'rsa' );  | 
| 
29
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
597
 | 
     $self->{'DATA'} = $prms{'Data'};  | 
| 
30
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
31
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1009
 | 
     bless $self, $type;  | 
| 
32
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
33
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
34
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
35
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub fetch {  | 
| 
36
 | 
2
 | 
 
 | 
 
 | 
  
2
  
 | 
  
1
  
 | 
591
 | 
     my $class  = shift;  | 
| 
37
 | 
2
 | 
 
 | 
 
 | 
 
 | 
 
 | 
7
 | 
     my $waiter = $class->fetch_async(@_);  | 
| 
38
 | 
2
 | 
 
 | 
 
 | 
 
 | 
 
 | 
5
 | 
     my $self   = $waiter->();  | 
| 
39
 | 
2
 | 
 
 | 
 
 | 
 
 | 
 
 | 
59
 | 
     return $self;  | 
| 
40
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
41
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
42
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # fetch_async() - asynchronously tries fetching a specific public key  | 
| 
43
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # using a specific protocol.  | 
| 
44
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #  | 
| 
45
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # Usage:  | 
| 
46
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #   my $fut = Mail::DKIM::PublicKey->fetch_async(  | 
| 
47
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #                      Protocol => 'dns/txt',  | 
| 
48
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #                      Selector => 'selector1',  | 
| 
49
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #                      Domain => 'example.org',  | 
| 
50
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #                      Callbacks => { ... }, #optional  | 
| 
51
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #                      );  | 
| 
52
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #  | 
| 
53
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #   # some later time  | 
| 
54
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #   my $pubkey = $fut->();    # blocks until the public key is returned  | 
| 
55
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #  | 
| 
56
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub fetch_async {  | 
| 
57
 | 
419
 | 
 
 | 
 
 | 
  
419
  
 | 
  
0
  
 | 
783
 | 
     my $class = shift;  | 
| 
58
 | 
419
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1675
 | 
     my %prms  = @_;  | 
| 
59
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
60
 | 
419
 | 
  
 50
  
 | 
  
 33
  
 | 
 
 | 
 
 | 
2853
 | 
     defined( $prms{Protocol} ) && $prms{Protocol} =~ m{^dns(/txt)?$}s  | 
| 
61
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
       or die "invalid/missing Protocol\n";  | 
| 
62
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
63
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     defined( $prms{Selector} ) && length( $prms{Selector} )  | 
| 
64
 | 
419
 | 
  
100
  
 | 
  
 66
  
 | 
 
 | 
 
 | 
1547
 | 
       or die "invalid/missing Selector\n";  | 
| 
65
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
66
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     defined( $prms{Domain} ) && length( $prms{Domain} )  | 
| 
67
 | 
417
 | 
  
 50
  
 | 
  
 33
  
 | 
 
 | 
 
 | 
1300
 | 
       or die "invalid/missing Domain\n";  | 
| 
68
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
69
 | 
417
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
615
 | 
     my %callbacks = %{ $prms{Callbacks} || {} };  | 
| 
 
 | 
417
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1954
 | 
    | 
| 
70
 | 
417
 | 
 
 | 
  
100
  
 | 
  
2
  
 | 
 
 | 
1163
 | 
     my $on_success = $callbacks{Success} || sub { $_[0] };  | 
| 
 
 | 
2
 | 
 
 | 
 
 | 
 
 | 
 
 | 
18
 | 
    | 
| 
71
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     $callbacks{Success} = sub {  | 
| 
72
 | 
363
 | 
 
 | 
 
 | 
  
363
  
 | 
 
 | 
743
 | 
         my @resp = @_;  | 
| 
73
 | 
363
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
786
 | 
         unless (@resp) {  | 
| 
74
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
75
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             # no requested resource records or NXDOMAIN,  | 
| 
76
 | 
5
 | 
 
 | 
 
 | 
 
 | 
 
 | 
23
 | 
             return $on_success->();  | 
| 
77
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
78
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
79
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
565
 | 
         my $strn;  | 
| 
80
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
786
 | 
         foreach my $rr (@resp) {  | 
| 
81
 | 
358
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
827
 | 
             next unless $rr->type eq 'TXT';  | 
| 
82
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
83
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             # join with no intervening spaces, RFC 6376  | 
| 
84
 | 
358
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
6280
 | 
             if ( Net::DNS->VERSION >= 0.69 ) {  | 
| 
85
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
86
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
                 # must call txtdata() in a list context  | 
| 
87
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1101
 | 
                 $strn = join '', $rr->txtdata;  | 
| 
88
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             }  | 
| 
89
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             else {  | 
| 
90
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
                 # char_str_list method is 'historical'  | 
| 
91
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
                 $strn = join '', $rr->char_str_list;  | 
| 
92
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             }  | 
| 
93
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
11094
 | 
             last;  | 
| 
94
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
95
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
96
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         $strn  | 
| 
97
 | 
358
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
812
 | 
           or return $on_success->();  | 
| 
98
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
99
 | 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1142
 | 
         my $self = $class->parse($strn);  | 
| 
100
 | 
356
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1131
 | 
         $self->{Selector} = $prms{'Selector'};  | 
| 
101
 | 
356
 | 
 
 | 
 
 | 
 
 | 
 
 | 
785
 | 
         $self->{Domain}   = $prms{'Domain'};  | 
| 
102
 | 
356
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1183
 | 
         $self->check;  | 
| 
103
 | 
352
 | 
 
 | 
 
 | 
 
 | 
 
 | 
953
 | 
         return $on_success->($self);  | 
| 
104
 | 
417
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1749
 | 
     };  | 
| 
105
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
106
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     #  | 
| 
107
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # perform DNS query for public key...  | 
| 
108
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     #  | 
| 
109
 | 
417
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1199
 | 
     my $host = $prms{Selector} . '._domainkey.' . $prms{Domain};  | 
| 
110
 | 
417
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1339
 | 
     my $waiter =  | 
| 
111
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
       Mail::DKIM::DNS::query_async( $host, 'TXT', Callbacks => \%callbacks, );  | 
| 
112
 | 
417
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1157
 | 
     return $waiter;  | 
| 
113
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
114
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
115
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
116
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # check syntax of the public key  | 
| 
117
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # throw an error if any errors are detected  | 
| 
118
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub check {  | 
| 
119
 | 
356
 | 
 
 | 
 
 | 
  
356
  
 | 
  
0
  
 | 
549
 | 
     my $self = shift;  | 
| 
120
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
121
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # check public key version tag  | 
| 
122
 | 
356
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
1211
 | 
     if ( my $v = $self->get_tag('v') ) {  | 
| 
123
 | 
335
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
804
 | 
         unless ( $v eq 'DKIM1' ) {  | 
| 
124
 | 
1
 | 
 
 | 
 
 | 
 
 | 
 
 | 
20
 | 
             die "unsupported version\n";  | 
| 
125
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
126
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
127
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
128
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # check public key granularity  | 
| 
129
 | 
355
 | 
 
 | 
 
 | 
 
 | 
 
 | 
895
 | 
     my $g = $self->granularity;  | 
| 
130
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
131
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # check key type  | 
| 
132
 | 
355
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
789
 | 
     if ( my $k = $self->get_tag('k') ) {  | 
| 
133
 | 
330
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
749
 | 
         unless ( $k eq 'rsa' ) {  | 
| 
134
 | 
1
 | 
 
 | 
 
 | 
 
 | 
 
 | 
10
 | 
             die "unsupported key type\n";  | 
| 
135
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
136
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
137
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
138
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # check public-key data  | 
| 
139
 | 
354
 | 
 
 | 
 
 | 
 
 | 
 
 | 
820
 | 
     my $p = $self->data;  | 
| 
140
 | 
354
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
761
 | 
     if ( not defined $p ) {  | 
| 
141
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         die "missing p= tag\n";  | 
| 
142
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
143
 | 
354
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
799
 | 
     if ( $p eq '' ) {  | 
| 
144
 | 
1
 | 
 
 | 
 
 | 
 
 | 
 
 | 
9
 | 
         die "revoked\n";  | 
| 
145
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
146
 | 
353
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
1489
 | 
     unless ( $p =~ /^[A-Za-z0-9\+\/\=]+$/ ) {  | 
| 
147
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         die "invalid data\n";  | 
| 
148
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
149
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
150
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # have OpenSSL load the key  | 
| 
151
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     eval {  | 
| 
152
 | 
353
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1142
 | 
         local $SIG{__DIE__};  | 
| 
153
 | 
353
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1303
 | 
         $self->cork;  | 
| 
154
 | 
353
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1417
 | 
 	1  | 
| 
155
 | 
353
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
564
 | 
     } || do {  | 
| 
156
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
157
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         # see also finish_body  | 
| 
158
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         chomp( my $E = $@ );  | 
| 
159
 | 
  
0
  
 | 
  
  0
  
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         if ( $E =~ /(OpenSSL error: .*?) at / ) {  | 
| 
 
 | 
 
 | 
  
  0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
160
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
             $E = "$1";  | 
| 
161
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
162
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         elsif ( $E =~ /^(panic:.*?) at / ) {  | 
| 
163
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
             $E = "OpenSSL $1";  | 
| 
164
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
165
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         die "$E\n";  | 
| 
166
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     };  | 
| 
167
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
168
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # check service type  | 
| 
169
 | 
353
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
963
 | 
     if ( my $s = $self->get_tag('s') ) {  | 
| 
170
 | 
22
 | 
 
 | 
 
 | 
 
 | 
 
 | 
77
 | 
         my @list = split( /:/, $s );  | 
| 
171
 | 
22
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
50
 | 
         unless ( grep { $_ eq '*' || $_ eq 'email' } @list ) {  | 
| 
 
 | 
26
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
139
 | 
    | 
| 
172
 | 
1
 | 
 
 | 
 
 | 
 
 | 
 
 | 
15
 | 
             die "does not support email\n";  | 
| 
173
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
174
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
175
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
176
 | 
352
 | 
 
 | 
 
 | 
 
 | 
 
 | 
712
 | 
     return 1;  | 
| 
177
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
178
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
179
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # check_granularity() - check whether this key matches signature identity  | 
| 
180
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #  | 
| 
181
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # a public key record can restrict what identities it may sign with,  | 
| 
182
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #   g=, granularity, restricts the local part of the identity  | 
| 
183
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #   t=s, restricts whether subdomains can be used  | 
| 
184
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #  | 
| 
185
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # This method returns true if the given identity is allowed by this  | 
| 
186
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # public key; it returns false otherwise.  | 
| 
187
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # If false is returned, you can check C<$@> for an explanation of  | 
| 
188
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # why.  | 
| 
189
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #  | 
| 
190
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub check_granularity {  | 
| 
191
 | 
349
 | 
 
 | 
 
 | 
  
349
  
 | 
  
0
  
 | 
588
 | 
     my $self = shift;  | 
| 
192
 | 
349
 | 
 
 | 
 
 | 
 
 | 
 
 | 
668
 | 
     my ( $identity, $empty_g_means_wildcard ) = @_;  | 
| 
193
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
194
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # check granularity  | 
| 
195
 | 
349
 | 
 
 | 
 
 | 
 
 | 
 
 | 
675
 | 
     my $g = $self->granularity;  | 
| 
196
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
197
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # yuck- what is this $empty_g_means_wildcard parameter?  | 
| 
198
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # well, it turns out that with DomainKeys signatures,  | 
| 
199
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # an empty g= is the same as g=*  | 
| 
200
 | 
349
 | 
  
100
  
 | 
  
100
  
 | 
 
 | 
 
 | 
894
 | 
     if ( $g eq '' && $empty_g_means_wildcard ) {  | 
| 
201
 | 
1
 | 
 
 | 
 
 | 
 
 | 
 
 | 
4
 | 
         $g = '*';  | 
| 
202
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
203
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
204
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # split i= value into a "local part" and a "domain part"  | 
| 
205
 | 
349
 | 
 
 | 
 
 | 
 
 | 
 
 | 
545
 | 
     my ( $local_part, $domain_part );  | 
| 
206
 | 
349
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
1115
 | 
     if ( $identity =~ /^(.*)\@([^@]*)$/ ) {  | 
| 
207
 | 
54
 | 
 
 | 
 
 | 
 
 | 
 
 | 
127
 | 
         $local_part  = $1;  | 
| 
208
 | 
54
 | 
 
 | 
 
 | 
 
 | 
 
 | 
117
 | 
         $domain_part = $2;  | 
| 
209
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
210
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     else {  | 
| 
211
 | 
295
 | 
 
 | 
 
 | 
 
 | 
 
 | 
420
 | 
         $local_part  = '';  | 
| 
212
 | 
295
 | 
 
 | 
 
 | 
 
 | 
 
 | 
406
 | 
         $domain_part = $identity;  | 
| 
213
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
214
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
215
 | 
349
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1060
 | 
     my ( $begins, $ends ) = split /\*/, $g, 2;  | 
| 
216
 | 
349
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
728
 | 
     if ( defined $ends ) {  | 
| 
217
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
218
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         # the g= tag contains an asterisk  | 
| 
219
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
220
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         # the local part must be at least as long as the pattern  | 
| 
221
 | 
348
 | 
  
100
  
 | 
  
 66
  
 | 
 
 | 
 
 | 
2050
 | 
         if (  | 
| 
 
 | 
 
 | 
 
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
 
 | 
 
 | 
 
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
222
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             length($local_part) < length($begins) + length($ends)  | 
| 
223
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             or  | 
| 
224
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
225
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             # the local part must begin with $begins  | 
| 
226
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             substr( $local_part, 0, length($begins) ) ne $begins  | 
| 
227
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             or  | 
| 
228
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
229
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             # the local part must end with $ends  | 
| 
230
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
             ( length($ends) && substr( $local_part, -length($ends) ) ne $ends )  | 
| 
231
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
           )  | 
| 
232
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         {  | 
| 
233
 | 
3
 | 
 
 | 
 
 | 
 
 | 
 
 | 
8
 | 
             $@ = "granularity mismatch\n";  | 
| 
234
 | 
3
 | 
 
 | 
 
 | 
 
 | 
 
 | 
12
 | 
             return;  | 
| 
235
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
236
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
237
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     else {  | 
| 
238
 | 
1
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
8
 | 
         if ( $g eq '' ) {  | 
| 
239
 | 
1
 | 
 
 | 
 
 | 
 
 | 
 
 | 
4
 | 
             $@ = "granularity is empty\n";  | 
| 
240
 | 
1
 | 
 
 | 
 
 | 
 
 | 
 
 | 
4
 | 
             return;  | 
| 
241
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
242
 | 
  
0
  
 | 
  
  0
  
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         unless ( $local_part eq $begins ) {  | 
| 
243
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
             $@ = "granularity mismatch\n";  | 
| 
244
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
             return;  | 
| 
245
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
246
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
247
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
248
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # check subdomains  | 
| 
249
 | 
345
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
776
 | 
     if ( $self->subdomain_flag ) {  | 
| 
250
 | 
2
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
11
 | 
         unless ( lc( $domain_part ) eq lc( $self->{'Domain'} ) ) {  | 
| 
251
 | 
1
 | 
 
 | 
 
 | 
 
 | 
 
 | 
2
 | 
             $@ = "does not support signing subdomains\n";  | 
| 
252
 | 
1
 | 
 
 | 
 
 | 
 
 | 
 
 | 
6
 | 
             return;  | 
| 
253
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
254
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
255
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
256
 | 
344
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1248
 | 
     return 1;  | 
| 
257
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
258
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
259
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # returns true if the actual hash algorithm used is listed by this  | 
| 
260
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # public key; dies otherwise  | 
| 
261
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #  | 
| 
262
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub check_hash_algorithm {  | 
| 
263
 | 
351
 | 
 
 | 
 
 | 
  
351
  
 | 
  
0
  
 | 
543
 | 
     my $self = shift;  | 
| 
264
 | 
351
 | 
 
 | 
 
 | 
 
 | 
 
 | 
623
 | 
     my ($hash_algorithm) = @_;  | 
| 
265
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
266
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # check hash algorithm  | 
| 
267
 | 
351
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
703
 | 
     if ( my $h = $self->get_tag('h') ) {  | 
| 
268
 | 
14
 | 
 
 | 
 
 | 
 
 | 
 
 | 
48
 | 
         my @list = split( /:/, $h );  | 
| 
269
 | 
14
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
35
 | 
         unless ( grep { $_ eq $hash_algorithm } @list ) {  | 
| 
 
 | 
38
 | 
 
 | 
 
 | 
 
 | 
 
 | 
97
 | 
    | 
| 
270
 | 
2
 | 
 
 | 
 
 | 
 
 | 
 
 | 
18
 | 
             die "does not support hash algorithm '$hash_algorithm'\n";  | 
| 
271
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         }  | 
| 
272
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
273
 | 
349
 | 
 
 | 
 
 | 
 
 | 
 
 | 
739
 | 
     return 1;  | 
| 
274
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
275
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
276
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # Create an OpenSSL public key object from the Base64-encoded data  | 
| 
277
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # found in this public key's DNS record. The OpenSSL object is saved  | 
| 
278
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # in the "cork" property.  | 
| 
279
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub convert {  | 
| 
280
 | 
14
 | 
 
 | 
 
 | 
  
14
  
 | 
 
 | 
3363
 | 
     use Crypt::OpenSSL::RSA;  | 
| 
 
 | 
14
 | 
 
 | 
 
 | 
 
 | 
 
 | 
42736
 | 
    | 
| 
 
 | 
14
 | 
 
 | 
 
 | 
 
 | 
 
 | 
13772
 | 
    | 
| 
281
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
282
 | 
353
 | 
 
 | 
 
 | 
  
353
  
 | 
  
0
  
 | 
491
 | 
     my $self = shift;  | 
| 
283
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
284
 | 
353
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
610
 | 
     $self->data  | 
| 
285
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
       or return;  | 
| 
286
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
287
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # have to PKCS1ify the pubkey because openssl is too finicky...  | 
| 
288
 | 
353
 | 
 
 | 
 
 | 
 
 | 
 
 | 
696
 | 
     my $cert = "-----BEGIN PUBLIC KEY-----\n";  | 
| 
289
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
290
 | 
353
 | 
 
 | 
 
 | 
 
 | 
 
 | 
755
 | 
     for ( my $i = 0 ; $i < length $self->data ; $i += 64 ) {  | 
| 
291
 | 
1355
 | 
 
 | 
 
 | 
 
 | 
 
 | 
2236
 | 
         $cert .= substr $self->data, $i, 64;  | 
| 
292
 | 
1355
 | 
 
 | 
 
 | 
 
 | 
 
 | 
3140
 | 
         $cert .= "\n";  | 
| 
293
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
294
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
295
 | 
353
 | 
 
 | 
 
 | 
 
 | 
 
 | 
657
 | 
     $cert .= "-----END PUBLIC KEY-----\n";  | 
| 
296
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
297
 | 
353
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
10553
 | 
     my $cork = Crypt::OpenSSL::RSA->new_public_key($cert)  | 
| 
298
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
       or die 'unable to generate public key object';  | 
| 
299
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
300
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # segfaults on my machine  | 
| 
301
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     #	$cork->check_key or  | 
| 
302
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     #		return;  | 
| 
303
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
304
 | 
353
 | 
 
 | 
 
 | 
 
 | 
 
 | 
17232
 | 
     $self->cork($cork);  | 
| 
305
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
306
 | 
353
 | 
 
 | 
 
 | 
 
 | 
 
 | 
700
 | 
     return 1;  | 
| 
307
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
308
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
309
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub verify {  | 
| 
310
 | 
  
0
  
 | 
 
 | 
 
 | 
  
0
  
 | 
  
0
  
 | 
0
 | 
     my $self = shift;  | 
| 
311
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     my %prms = @_;  | 
| 
312
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
313
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     my $rtrn;  | 
| 
314
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
315
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     eval {  | 
| 
316
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         local $SIG{__DIE__};  | 
| 
317
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         $rtrn = $self->cork->verify( $prms{'Text'}, $prms{'Signature'} );  | 
| 
318
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
 	1  | 
| 
319
 | 
  
0
  
 | 
  
  0
  
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     } || do {  | 
| 
320
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
 	$self->errorstr($@);  | 
| 
321
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
 	return;  | 
| 
322
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     };  | 
| 
323
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
324
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     return $rtrn;  | 
| 
325
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
326
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
327
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
328
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub granularity {  | 
| 
329
 | 
704
 | 
 
 | 
 
 | 
  
704
  
 | 
  
1
  
 | 
1040
 | 
     my $self = shift;  | 
| 
330
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
331
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # set new granularity if provided  | 
| 
332
 | 
704
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
1523
 | 
     (@_)  | 
| 
333
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
       and $self->set_tag( 'g', shift );  | 
| 
334
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
335
 | 
704
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1510
 | 
     my $g = $self->get_tag('g');  | 
| 
336
 | 
704
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
1347
 | 
     if ( defined $g ) {  | 
| 
337
 | 
44
 | 
 
 | 
 
 | 
 
 | 
 
 | 
92
 | 
         return $g;  | 
| 
338
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
339
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     else {  | 
| 
340
 | 
660
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1346
 | 
         return '*';  | 
| 
341
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
342
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
343
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
344
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub notes {  | 
| 
345
 | 
  
0
  
 | 
 
 | 
 
 | 
  
0
  
 | 
  
0
  
 | 
0
 | 
     my $self = shift;  | 
| 
346
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
347
 | 
  
0
  
 | 
  
  0
  
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     (@_)  | 
| 
348
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
       and $self->set_tag( 'n', shift );  | 
| 
349
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
350
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     return $self->get_tag('n');  | 
| 
351
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
352
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
353
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub data {  | 
| 
354
 | 
3770
 | 
 
 | 
 
 | 
  
3770
  
 | 
  
0
  
 | 
5066
 | 
     my $self = shift;  | 
| 
355
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
356
 | 
3770
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
6455
 | 
     (@_)  | 
| 
357
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
       and $self->set_tag( 'p', shift );  | 
| 
358
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
359
 | 
3770
 | 
 
 | 
 
 | 
 
 | 
 
 | 
6908
 | 
     my $p = $self->get_tag('p');  | 
| 
360
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
361
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # remove whitespace (actually only LWSP is allowed) and double quote (long string delimiter)  | 
| 
362
 | 
3770
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
10312
 | 
     $p =~ tr/\015\012 \t"//d  if defined $p;  | 
| 
363
 | 
3770
 | 
 
 | 
 
 | 
 
 | 
 
 | 
8724
 | 
     return $p;  | 
| 
364
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
365
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
366
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub flags {  | 
| 
367
 | 
345
 | 
 
 | 
 
 | 
  
345
  
 | 
  
0
  
 | 
570
 | 
     my $self = shift;  | 
| 
368
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
369
 | 
345
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
731
 | 
     (@_)  | 
| 
370
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
       and $self->set_tag( 't', shift );  | 
| 
371
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
372
 | 
345
 | 
 
 | 
  
100
  
 | 
 
 | 
 
 | 
752
 | 
     return $self->get_tag('t') || '';  | 
| 
373
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
374
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
375
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # subdomain_flag() - checks whether "s" is specified in flags  | 
| 
376
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #  | 
| 
377
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # returns true if "s" is found, false otherwise  | 
| 
378
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #  | 
| 
379
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub subdomain_flag {  | 
| 
380
 | 
345
 | 
 
 | 
 
 | 
  
345
  
 | 
  
0
  
 | 
549
 | 
     my $self = shift;  | 
| 
381
 | 
345
 | 
 
 | 
 
 | 
 
 | 
 
 | 
699
 | 
     my @flags = split /:/, $self->flags;  | 
| 
382
 | 
345
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1018
 | 
     return grep { $_ eq 's' } @flags;  | 
| 
 
 | 
20
 | 
 
 | 
 
 | 
 
 | 
 
 | 
80
 | 
    | 
| 
383
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
384
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
385
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub revoked {  | 
| 
386
 | 
  
0
  
 | 
 
 | 
 
 | 
  
0
  
 | 
  
0
  
 | 
0
 | 
     my $self = shift;  | 
| 
387
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
388
 | 
  
0
  
 | 
  
  0
  
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     $self->data  | 
| 
389
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
       or return 1;  | 
| 
390
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
391
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     return;  | 
| 
392
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
393
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
394
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub testing {  | 
| 
395
 | 
  
0
  
 | 
 
 | 
 
 | 
  
0
  
 | 
  
0
  
 | 
0
 | 
     my $self = shift;  | 
| 
396
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
397
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     my $flags = $self->flags;  | 
| 
398
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     my @flaglist = split( /:/, $flags );  | 
| 
399
 | 
  
0
  
 | 
  
  0
  
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     if ( grep { $_ eq 'y' } @flaglist ) {  | 
| 
 
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
    | 
| 
400
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         return 1;  | 
| 
401
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
402
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     return undef;  | 
| 
403
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
404
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
405
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub verify_sha1_digest {  | 
| 
406
 | 
  
0
  
 | 
 
 | 
 
 | 
  
0
  
 | 
  
0
  
 | 
0
 | 
     my $self = shift;  | 
| 
407
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     my ( $digest, $signature ) = @_;  | 
| 
408
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
     return $self->verify_digest( 'SHA-1', $digest, $signature );  | 
| 
409
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
410
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
411
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # verify_digest() - returns true if the digest verifies, false otherwise  | 
| 
412
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #  | 
| 
413
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 # if false, $@ is set to a description of the problem  | 
| 
414
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 #  | 
| 
415
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 sub verify_digest {  | 
| 
416
 | 
341
 | 
 
 | 
 
 | 
  
341
  
 | 
  
0
  
 | 
520
 | 
     my $self = shift;  | 
| 
417
 | 
341
 | 
 
 | 
 
 | 
 
 | 
 
 | 
741
 | 
     my ( $digest_algorithm, $digest, $signature ) = @_;  | 
| 
418
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
419
 | 
341
 | 
 
 | 
 
 | 
 
 | 
 
 | 
866
 | 
     my $rsa_pub = $self->cork;  | 
| 
420
 | 
341
 | 
  
 50
  
 | 
 
 | 
 
 | 
 
 | 
723
 | 
     if ( !$rsa_pub ) {  | 
| 
421
 | 
  
0
  
 | 
  
  0
  
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         $@ = $@ ne '' ? "RSA failed: $@" : 'RSA unknown problem';  | 
| 
422
 | 
  
0
  
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         $@ .= ", s=$self->{Selector} d=$self->{Domain}";  | 
| 
423
 | 
0
 | 
 
 | 
 
 | 
 
 | 
 
 | 
0
 | 
         return;  | 
| 
424
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
425
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
426
 | 
341
 | 
 
 | 
 
 | 
 
 | 
 
 | 
980
 | 
     $rsa_pub->use_no_padding;  | 
| 
427
 | 
341
 | 
 
 | 
 
 | 
 
 | 
 
 | 
14383
 | 
     my $verify_result = $rsa_pub->encrypt($signature);  | 
| 
428
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
429
 | 
333
 | 
 
 | 
 
 | 
 
 | 
 
 | 
1066
 | 
     my $k = $rsa_pub->size;  | 
| 
430
 | 
333
 | 
 
 | 
 
 | 
 
 | 
 
 | 
881
 | 
     my $expected = calculate_EM( $digest_algorithm, $digest, $k );  | 
| 
431
 | 
333
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
1297
 | 
     return 1 if ( $verify_result eq $expected );  | 
| 
432
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
433
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # well, the RSA verification failed; I wonder if the RSA signing  | 
| 
434
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # was performed on a different digest value? I think we can check...  | 
| 
435
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
436
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # basically, if the $verify_result has the same prefix as $expected,  | 
| 
437
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     # then only the digest was different  | 
| 
438
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
439
 | 
63
 | 
 
 | 
 
 | 
 
 | 
 
 | 
109
 | 
     my $digest_len = length $digest;  | 
| 
440
 | 
63
 | 
 
 | 
 
 | 
 
 | 
 
 | 
117
 | 
     my $prefix_len = length($expected) - $digest_len;  | 
| 
441
 | 
63
 | 
  
100
  
 | 
 
 | 
 
 | 
 
 | 
235
 | 
     if (  | 
| 
442
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         substr( $verify_result, 0, $prefix_len ) eq  | 
| 
443
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
         substr( $expected,      0, $prefix_len ) )  | 
| 
444
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     {  | 
| 
445
 | 
60
 | 
 
 | 
 
 | 
 
 | 
 
 | 
102
 | 
         $@ = 'message has been altered';  | 
| 
446
 | 
60
 | 
 
 | 
 
 | 
 
 | 
 
 | 
336
 | 
         return;  | 
| 
447
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
     }  | 
| 
448
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
449
 | 
3
 | 
 
 | 
 
 | 
 
 | 
 
 | 
6
 | 
     $@ = 'bad RSA signature';  | 
| 
450
 | 
3
 | 
 
 | 
 
 | 
 
 | 
 
 | 
16
 | 
     return;  | 
| 
451
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 }  | 
| 
452
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
453
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 1;  | 
| 
454
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
    | 
| 
455
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 
 | 
 __END__  |