version 1.19, 2022/02/14 02:48:49
|
version 1.20, 2022/02/16 00:06:08
|
Line 42 use Crypt::OpenSSL::X509;
|
Line 42 use Crypt::OpenSSL::X509;
|
use Crypt::X509::CRL; |
use Crypt::X509::CRL; |
use Crypt::PKCS10; |
use Crypt::PKCS10; |
use Net::OAuth; |
use Net::OAuth; |
|
use Crypt::CBC; |
|
|
sub dump_with_regexp { |
sub dump_with_regexp { |
my ( $tail, $clientversion ) = @_; |
my ( $tail, $clientversion ) = @_; |
Line 1063 sub store_dom {
|
Line 1064 sub store_dom {
|
$allkeys.='timestamp'; |
$allkeys.='timestamp'; |
$hashref->{"$version:keys:$rid"}=$allkeys; |
$hashref->{"$version:keys:$rid"}=$allkeys; |
&untie_user_hash($hashref) or |
&untie_user_hash($hashref) or |
return "error: ".($!+0)." untie(GDBM) Failed while attempting $cmd"; |
return "error: ".($!+0)." untie(GDBM) Failed while attempting $cmd"; |
return 'ok'; |
return 'ok'; |
} |
} |
|
|
Line 1140 sub crslti_itemid {
|
Line 1141 sub crslti_itemid {
|
|
|
return if (!keys(%crslti_by_key)); |
return if (!keys(%crslti_by_key)); |
|
|
|
my %courselti = &Apache::lonnet::get_course_lti($cnum,$cdom,'provider'); |
|
|
if (ref($crslti_by_key{$consumer_key}) eq 'ARRAY') { |
if (ref($crslti_by_key{$consumer_key}) eq 'ARRAY') { |
foreach my $id (@{$crslti_by_key{$consumer_key}}) { |
foreach my $id (@{$crslti_by_key{$consumer_key}}) { |
my $secret = $crslti{$id}{'secret'}; |
my $secret = $crslti{$id}{'secret'}; |
|
if (ref($courselti{$id}) eq 'HASH') { |
|
if ((exists($courselti{$id}{'cipher'})) && |
|
($courselti{$id}{'cipher'} =~ /^\d+$/)) { |
|
my $keynum = $courselti{$id}{'cipher'}; |
|
my $privkey = &get_dom("getdom:$cdom:private:$keynum:lti:key"); |
|
if ($privkey ne '') { |
|
my $cipher = new Crypt::CBC($privkey); |
|
$secret = $cipher->decrypt_hex($secret); |
|
} |
|
} |
|
} |
my $request = Net::OAuth->request('request token')->from_hash($params, |
my $request = Net::OAuth->request('request token')->from_hash($params, |
request_url => $url, |
request_url => $url, |
request_method => $method, |
request_method => $method, |