… | |
… | |
126 | $self->{queue} = []; |
126 | $self->{queue} = []; |
127 | |
127 | |
128 | { |
128 | { |
129 | Scalar::Util::weaken (my $self = $self); |
129 | Scalar::Util::weaken (my $self = $self); |
130 | |
130 | |
131 | #$arg{tls_ctx} ||= { sslv2 => 0, sslv3 => 0, tlsv1 => 1, verify => 1 }; |
131 | $arg{tls_ctx_disabled} ||= { |
|
|
132 | sslv2 => 0, |
|
|
133 | sslv3 => 0, |
|
|
134 | tlsv1 => 1, |
|
|
135 | verify => 1, |
|
|
136 | cert_file => "secret.pem", |
|
|
137 | ca_file => "secret.pem", |
|
|
138 | verify_require_client_cert => 1, |
|
|
139 | }; |
132 | |
140 | |
133 | $arg{secret} = AnyEvent::MP::Base::default_secret () |
141 | $arg{secret} = AnyEvent::MP::Base::default_secret () |
134 | unless exists $arg{secret}; |
142 | unless exists $arg{secret}; |
135 | |
143 | |
136 | $self->{hdl} = new AnyEvent::Handle |
144 | $self->{hdl} = new AnyEvent::Handle |
… | |
… | |
217 | |
225 | |
218 | # auth |
226 | # auth |
219 | require Digest::MD6; |
227 | require Digest::MD6; |
220 | require Digest::HMAC_MD6; |
228 | require Digest::HMAC_MD6; |
221 | |
229 | |
222 | my $key = Digest::MD6::md6_hex ($secret); |
230 | my $key = Digest::MD6::md6 ($secret); |
223 | my $lauth = Digest::HMAC_MD6::hmac_md6_base64 ($key, "$lgreeting1\012$lgreeting2\012$rgreeting1\012$rgreeting2\012", 64, 256); |
231 | my $lauth = Digest::HMAC_MD6::hmac_md6_base64 ($key, "$lgreeting1\012$lgreeting2\012$rgreeting1\012$rgreeting2\012", 64, 256); |
224 | |
232 | |
225 | my $rauth = |
233 | my $rauth = |
226 | $s_auth eq "hmac_md6_64_256" ? Digest::HMAC_MD6::hmac_md6_base64 ($key, "$rgreeting1\012$rgreeting2\012$lgreeting1\012$lgreeting2\012", 64, 256) |
234 | $s_auth eq "hmac_md6_64_256" ? Digest::HMAC_MD6::hmac_md6_base64 ($key, "$rgreeting1\012$rgreeting2\012$lgreeting1\012$lgreeting2\012", 64, 256) |
227 | : $s_auth eq "hex_secret" ? unpack "H*", $secret |
235 | : $s_auth eq "hex_secret" ? unpack "H*", $secret |