line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Net::Whois::Object::KeyCert; |
2
|
|
|
|
|
|
|
|
3
|
1
|
|
|
1
|
|
74097
|
use strict; |
|
1
|
|
|
|
|
10
|
|
|
1
|
|
|
|
|
29
|
|
4
|
1
|
|
|
1
|
|
5
|
use warnings; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
27
|
|
5
|
1
|
|
|
1
|
|
5
|
use base qw/Net::Whois::Object/; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
566
|
|
6
|
|
|
|
|
|
|
|
7
|
|
|
|
|
|
|
####################################################################################### |
8
|
|
|
|
|
|
|
# The following lines where auto-generated by 'perl whois_to_attribute.pl KeyCert' |
9
|
|
|
|
|
|
|
|
10
|
|
|
|
|
|
|
# % This is the RIPE Database query service. |
11
|
|
|
|
|
|
|
# % The objects are in RPSL format. |
12
|
|
|
|
|
|
|
# % |
13
|
|
|
|
|
|
|
# % The RIPE Database is subject to Terms and Conditions. |
14
|
|
|
|
|
|
|
# % See http://www.ripe.net/db/support/db-terms-conditions.pdf |
15
|
|
|
|
|
|
|
# |
16
|
|
|
|
|
|
|
# key-cert: [mandatory] [single] [primary/lookup key] |
17
|
|
|
|
|
|
|
# method: [generated] [single] [ ] |
18
|
|
|
|
|
|
|
# owner: [generated] [multiple] [ ] |
19
|
|
|
|
|
|
|
# fingerpr: [generated] [single] [inverse key] |
20
|
|
|
|
|
|
|
# certif: [mandatory] [multiple] [ ] |
21
|
|
|
|
|
|
|
# org: [optional] [multiple] [inverse key] |
22
|
|
|
|
|
|
|
# remarks: [optional] [multiple] [ ] |
23
|
|
|
|
|
|
|
# notify: [optional] [multiple] [inverse key] |
24
|
|
|
|
|
|
|
# admin-c: [optional] [multiple] [inverse key] |
25
|
|
|
|
|
|
|
# tech-c: [optional] [multiple] [inverse key] |
26
|
|
|
|
|
|
|
# mnt-by: [mandatory] [multiple] [inverse key] |
27
|
|
|
|
|
|
|
# changed: [mandatory] [multiple] [ ] |
28
|
|
|
|
|
|
|
# created: [generated] [single] [ ] |
29
|
|
|
|
|
|
|
# last-modified: [generated] [single] [ ] |
30
|
|
|
|
|
|
|
# source: [mandatory] [single] [ ] |
31
|
|
|
|
|
|
|
# |
32
|
|
|
|
|
|
|
# % This query was served by the RIPE Database Query Service version 1.79.2 (DB-4) |
33
|
|
|
|
|
|
|
# |
34
|
|
|
|
|
|
|
# |
35
|
|
|
|
|
|
|
__PACKAGE__->attributes( 'primary', [ 'key_cert' ] ); |
36
|
|
|
|
|
|
|
__PACKAGE__->attributes( 'mandatory', [ 'key_cert', 'certif', 'mnt_by', 'changed', 'source' ] ); |
37
|
|
|
|
|
|
|
__PACKAGE__->attributes( 'optional', [ 'method', 'owner', 'fingerpr', 'org', 'remarks', 'notify', 'admin_c', 'tech_c', 'created', 'last_modified' ] ); |
38
|
|
|
|
|
|
|
__PACKAGE__->attributes( 'single', [ 'key_cert', 'method', 'fingerpr', 'created', 'last_modified', 'source' ] ); |
39
|
|
|
|
|
|
|
__PACKAGE__->attributes( 'multiple', [ 'owner', 'certif', 'org', 'remarks', 'notify', 'admin_c', 'tech_c', 'mnt_by', 'changed' ] ); |
40
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
# End of auto-generated lines |
42
|
|
|
|
|
|
|
####################################################################################### |
43
|
|
|
|
|
|
|
|
44
|
|
|
|
|
|
|
=head1 NAME |
45
|
|
|
|
|
|
|
|
46
|
|
|
|
|
|
|
Net::Whois::Object::KeyCert - an object representation of the RPSL KeyCert block |
47
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
=head1 DESCRIPTION |
49
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
A key-cert object is a database public key certificate that is stored |
51
|
|
|
|
|
|
|
on the server and may be used with a mntner object for authentication |
52
|
|
|
|
|
|
|
when performing updates. Currently only PGP keys are supported. |
53
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
=head1 METHODS |
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
=head2 B |
57
|
|
|
|
|
|
|
|
58
|
|
|
|
|
|
|
Constructor for the Net::Whois::Object::InetRtr class |
59
|
|
|
|
|
|
|
|
60
|
|
|
|
|
|
|
=cut |
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
sub new { |
63
|
1
|
|
|
1
|
1
|
4
|
my ( $class, @options ) = @_; |
64
|
|
|
|
|
|
|
|
65
|
1
|
|
|
|
|
3
|
my $self = bless {}, $class; |
66
|
1
|
|
|
|
|
8
|
$self->_init(@options); |
67
|
|
|
|
|
|
|
|
68
|
1
|
|
|
|
|
4
|
return $self; |
69
|
|
|
|
|
|
|
} |
70
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
=head2 B |
72
|
|
|
|
|
|
|
|
73
|
|
|
|
|
|
|
Accessor to the key_cert attribute. |
74
|
|
|
|
|
|
|
Accepts an optional key_cert value, always return the current key_cert value. |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
For PGP KeyCert objects, the value of the key_cert attribute must be |
77
|
|
|
|
|
|
|
PGP-"key-id". These keys are compliant with the Open PGP Internet Standard. |
78
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
For X.509 KeyCert objects, the database software assigns this value as |
80
|
|
|
|
|
|
|
X.509-n. Here, 'n' is the next available number assigned by the software. If |
81
|
|
|
|
|
|
|
you want to create an X.509 KeyCert object, you should specify the value as |
82
|
|
|
|
|
|
|
AUTO-xx. If you delete an X.509 KeyCert object, it is not possible to |
83
|
|
|
|
|
|
|
recreate it with the same name. |
84
|
|
|
|
|
|
|
|
85
|
|
|
|
|
|
|
=head2 B |
86
|
|
|
|
|
|
|
|
87
|
|
|
|
|
|
|
Accessor to the method attribute. |
88
|
|
|
|
|
|
|
Accepts an optional method, always return the current method value. |
89
|
|
|
|
|
|
|
|
90
|
|
|
|
|
|
|
The method attribute is generated by the software. |
91
|
|
|
|
|
|
|
It is not necessary to include this attribute when you create or |
92
|
|
|
|
|
|
|
modify this object. If it is supplied, the software will check the value. |
93
|
|
|
|
|
|
|
If necessary the software will replace the supplied value with generated |
94
|
|
|
|
|
|
|
value. In this case a warning is returned to the user. |
95
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
=head2 B |
97
|
|
|
|
|
|
|
|
98
|
|
|
|
|
|
|
Accessor to the owner attribute. |
99
|
|
|
|
|
|
|
Accepts an optional owner to be added to the owner array, |
100
|
|
|
|
|
|
|
always return the current owner array. |
101
|
|
|
|
|
|
|
|
102
|
|
|
|
|
|
|
The owner attribute is generated by the software. |
103
|
|
|
|
|
|
|
It is not necessary to include this attribute when you create or |
104
|
|
|
|
|
|
|
modify this object. If it is supplied, the software will check the value. |
105
|
|
|
|
|
|
|
If necessary the software will replace the supplied value with generated |
106
|
|
|
|
|
|
|
value. In this case a warning is returned to the user. |
107
|
|
|
|
|
|
|
|
108
|
|
|
|
|
|
|
=head2 B |
109
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
Accessor to the fingerpr attribute. |
111
|
|
|
|
|
|
|
Accepts an optional fingerpr, always return the current fingerpr. |
112
|
|
|
|
|
|
|
|
113
|
|
|
|
|
|
|
The fingerpr attribute is generated by the software. |
114
|
|
|
|
|
|
|
It is not necessary to include this attribute when you create or |
115
|
|
|
|
|
|
|
modify this object. If it is supplied, the software will check the value. |
116
|
|
|
|
|
|
|
If necessary the software will replace the supplied value with generated |
117
|
|
|
|
|
|
|
value. In this case a warning is returned to the user. |
118
|
|
|
|
|
|
|
|
119
|
|
|
|
|
|
|
=head2 B |
120
|
|
|
|
|
|
|
|
121
|
|
|
|
|
|
|
Accessor to the certif attribute. |
122
|
|
|
|
|
|
|
Accepts an optional certif to be added to the certif array, |
123
|
|
|
|
|
|
|
always return the current certif array. |
124
|
|
|
|
|
|
|
|
125
|
|
|
|
|
|
|
The certif attribute contains the public key. The value of the public key |
126
|
|
|
|
|
|
|
should be supplied either using multiple certif attributes, or in one |
127
|
|
|
|
|
|
|
certif attribute split over several lines. In the first case, this is |
128
|
|
|
|
|
|
|
easily done by exporting the key from your local key ring in ASCII armored |
129
|
|
|
|
|
|
|
format and adding the string certif to the start of each line of the key. |
130
|
|
|
|
|
|
|
In the second case, line continuation should be used to represent an ASCII |
131
|
|
|
|
|
|
|
armored format of the key. All the lines of the exported key must be included, |
132
|
|
|
|
|
|
|
as well as the start/end markers and the empty line which separates the header |
133
|
|
|
|
|
|
|
from the key body. |
134
|
|
|
|
|
|
|
|
135
|
|
|
|
|
|
|
=head2 B |
136
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
Accessor to the remarks attribute. |
138
|
|
|
|
|
|
|
Accepts an optional remark to be added to the remarks array, |
139
|
|
|
|
|
|
|
always return the current remarks array. |
140
|
|
|
|
|
|
|
|
141
|
|
|
|
|
|
|
General remarks. May include a URL or email address. |
142
|
|
|
|
|
|
|
|
143
|
|
|
|
|
|
|
=head2 B |
144
|
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
Accessor to the org attribute. |
146
|
|
|
|
|
|
|
Accepts an optional org value to be added to the org array, |
147
|
|
|
|
|
|
|
always return the current org array. |
148
|
|
|
|
|
|
|
|
149
|
|
|
|
|
|
|
The organisation entity this object is bound to. |
150
|
|
|
|
|
|
|
|
151
|
|
|
|
|
|
|
=head2 B |
152
|
|
|
|
|
|
|
|
153
|
|
|
|
|
|
|
Accessor to the notify attribute. |
154
|
|
|
|
|
|
|
Accepts an optional notify value to be added to the notify array, |
155
|
|
|
|
|
|
|
always return the current notify array. |
156
|
|
|
|
|
|
|
|
157
|
|
|
|
|
|
|
The email address to which notifications of changes to this object should be |
158
|
|
|
|
|
|
|
sent. |
159
|
|
|
|
|
|
|
|
160
|
|
|
|
|
|
|
=head2 B |
161
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
Accessor to the admin_c attribute. |
163
|
|
|
|
|
|
|
Accepts an optional contact to be added to the admin_c array, |
164
|
|
|
|
|
|
|
always return the current admin_c array. |
165
|
|
|
|
|
|
|
|
166
|
|
|
|
|
|
|
The NIC-handle of an on-site contact Person object. As more than one person |
167
|
|
|
|
|
|
|
often fulfills a role function, there may be more than one admin_c listed. |
168
|
|
|
|
|
|
|
|
169
|
|
|
|
|
|
|
An administrative contact (admin_c) must be someone who is physically |
170
|
|
|
|
|
|
|
located at the site of the network. |
171
|
|
|
|
|
|
|
|
172
|
|
|
|
|
|
|
=head2 B |
173
|
|
|
|
|
|
|
|
174
|
|
|
|
|
|
|
Accessor to the tech_c attribute. |
175
|
|
|
|
|
|
|
Accepts an optional contact to be added to the tech_c array, |
176
|
|
|
|
|
|
|
always return the current tech_c array. |
177
|
|
|
|
|
|
|
|
178
|
|
|
|
|
|
|
The NIC-handle of a technical contact Person or Role object. As more than |
179
|
|
|
|
|
|
|
one person often fulfills a role function, there may be more than one tech_c |
180
|
|
|
|
|
|
|
listed. |
181
|
|
|
|
|
|
|
|
182
|
|
|
|
|
|
|
A technical contact (tech_c) must be a person responsible for the |
183
|
|
|
|
|
|
|
day-to-day operation of the network, but does not need to be |
184
|
|
|
|
|
|
|
physically located at the site of the network. |
185
|
|
|
|
|
|
|
|
186
|
|
|
|
|
|
|
=head2 B |
187
|
|
|
|
|
|
|
|
188
|
|
|
|
|
|
|
Accessor to the mnt_by attribute. |
189
|
|
|
|
|
|
|
Accepts an optional mnt_by value to be added to the mnt_by array, |
190
|
|
|
|
|
|
|
always return the current mnt_by array. |
191
|
|
|
|
|
|
|
|
192
|
|
|
|
|
|
|
Lists a registered Mntner used to authorize and authenticate changes to this |
193
|
|
|
|
|
|
|
object. |
194
|
|
|
|
|
|
|
|
195
|
|
|
|
|
|
|
|
196
|
|
|
|
|
|
|
=head2 B |
197
|
|
|
|
|
|
|
|
198
|
|
|
|
|
|
|
Accessor to the changed attribute. |
199
|
|
|
|
|
|
|
Accepts an optional changed value to be added to the changed array, |
200
|
|
|
|
|
|
|
always return the current changed array. |
201
|
|
|
|
|
|
|
|
202
|
|
|
|
|
|
|
The email address of who last updated the database object and the date it |
203
|
|
|
|
|
|
|
occurred. |
204
|
|
|
|
|
|
|
|
205
|
|
|
|
|
|
|
Every time a change is made to a database object, this attribute will show |
206
|
|
|
|
|
|
|
the email address of the person who made those changes. |
207
|
|
|
|
|
|
|
Please use the address format specified in RFC 822 - Standard for |
208
|
|
|
|
|
|
|
the Format of ARPA Internet Text Message and provide the date |
209
|
|
|
|
|
|
|
format using one of the following two formats: YYYYMMDD or YYMMDD. |
210
|
|
|
|
|
|
|
|
211
|
|
|
|
|
|
|
=head2 B |
212
|
|
|
|
|
|
|
|
213
|
|
|
|
|
|
|
Accessor to the source attribute. |
214
|
|
|
|
|
|
|
Accepts an optional source, always return the current source. |
215
|
|
|
|
|
|
|
|
216
|
|
|
|
|
|
|
The database where the object is registered. |
217
|
|
|
|
|
|
|
|
218
|
|
|
|
|
|
|
=cut |
219
|
|
|
|
|
|
|
|
220
|
|
|
|
|
|
|
1; |