Authen::Captcha provides an object oriented interface to captcha file
creations. Captcha stands for Compl etely Automated Public Turning test
to tell Computers and Humans Apart. A Captcha is a program that can
generate and grade tests that:
- most humans can pass
- current computer programs can't pass
The most common form is an image file containing distorted text, which
humans are adept at reading, and co mputers (generally) do a poor job.
This module currently implements that method.
This perl module implements the LGI$HPWD password hashing function
from VMS, and some associated VMS username and password handling
functions.
This module provides a convenient, object-oriented interface to
Apache-style .htpasswd files. It supports passwords encrypted via MD5,
SHA1, and crypt, as well as plain (cleartext) passwords. Additional
fields after username and password, if present, are accessible via the
extra_info array.
Implementation of a function 'digest()' for the creation of hash
digests of arbitrary R objects (using the md5, sha-1, sha-256,
crc32, xxhash and murmurhash algorithms) permitting easy comparison
of R language objects, as well as a function 'hmac()' to create
hash-based message authentication code. The md5 algorithm by Ron
Rivest is specified in RFC 1321, the sha-1 and sha-256 algorithms
are specified in FIPS-180-1 and FIPS-180-2, and the crc32 algorithm
is described in ftp://ftp.rocksoft.com/cliens/rocksoft/papers/crc_v3.txt.
For md5, sha-1, sha-256 and aes, this package uses small standalone
implementations that were provided by Christophe Devine. For crc32,
code from the zlib library is used. For sha-512, an implementation
by Aaron D. Gifford is used. For xxHash, the implementation by Yann
Collet is used. For murmurhash, an implementation by Shane Day is
used. Please note that this package is not meant to be deployed for
cryptographic purposes for which more comprehensive (and widely
tested) libraries such as OpenSSL should be used.
The NTLM (Windows NT LAN Manager) authentication scheme is the
authentication algorithm used by Microsoft.
NTLM authentication scheme is used in DCOM and HTTP environment. It is
used to authenticate DCE RPC packets in DCOM. It is also used to
authenticate HTTP packets to MS Web Proxy or MS Web Server.
Currently, it is the authentication scheme Internet Explorer chooses to
authenticate itself to proxies/web servers that supports NTLM.
The Authen::OATH module provides a Perl implementation of the
HOTP and TOTP One Time Password algorithms as defined by OATH
(http://www.openautentication.org).
The Authen::PAAS distribution provides a Perl API for authenticating and
authorizing users of computing services. Its design is inspired by
existing pluggable authentication services such as PAM and Java's JAAS, so
people familiar with those two services should be comfortable with the
concepts in Authen::PAAS. At its heart, Authen::PAAS provides a login
service, with pluggable modules for performing different authentication
schemes. The pluggable framework enables the system administrator, rather
than the application developer to define what method is used to
authentication with a particular application.
One might ask, why not just use PAM directly via the existing Authen::PAM
Perl bindings. While this works well for applications which wish to
authenticate against real UNIX user accounts (eg FTP, Telnet, SSH), it is
not particularly well suited to applications with 'virtualized' user
accounts. For example, a web application may maintain a set of virtual
user accounts in a database, or a chat server, may maintain a set of user
accounts in a text configuration file. Since it merely delegates through
to the underlying C libraries, the Authen::PAM module does not provide a
convenient means to write new authentication schemes in Perl. Thus the
Authen::PAAS distribution provides a pure Perl API for authentication.