I hereby claim:
- I am fredreichbier on github.
- I am fredreichbier (https://keybase.io/fredreichbier) on keybase.
- I have a public key whose fingerprint is CBBF 0504 EA2F 25D3 9B46 0DD4 9ED4 EA40 716D 9A63
To claim this, I am signing this object:
+-------------------------------+-------------------------------------------------+ | |
| Configuration | | | |
+-------------------------------+-------------------------------------------------+ | |
| hasMemberOfFilterSupport | 0 | | |
| hasPagedResultSupport | | | |
| homeFolderNamingRule | | | |
| lastJpegPhotoLookup | 0 | | |
| ldapAgentName | uid=serviceacc,cn=users,dc=ucs-test,dc=intranet | | |
| ldapAgentPassword | *** | | |
| ldapAttributesForGroupSearch | | |
{ | |
"system": { | |
"instanceid": "ocs7le78z70b", | |
"passwordsalt": "***REMOVED SENSITIVE VALUE***", | |
"secret": "***REMOVED SENSITIVE VALUE***", | |
"trusted_domains": [ | |
"192.168.33.180" | |
], | |
"datadirectory": "\/var\/www\/owncloud\/data", | |
"overwrite.cli.url": "https:\/\/192.168.33.180", |
[loggers] | |
keys=ldap3,root | |
[formatters] | |
keys=form | |
[handlers] | |
keys=hand | |
[logger_ldap3] |
I hereby claim:
To claim this, I am signing this object:
import structs/HashBag | |
import text/json/Generator | |
obj := HashBag new() | |
obj put("version", null as String) | |
generateString(obj) println() |
import text/StringTokenizer | |
"1) " split(".") get(0) println() | |
"2) %s" printfln("" split(".") get(0)) | |
// prints: | |
// 1) | |
// 2) (nil) |
$ ./test-threading | |
false returned 0 | |
true returned 1 | |
false returned 1 | |
true returned 0 | |
true returned 1 | |
false returned 0 | |
... |
g: func <T> (T: Class) -> String { "" } | |
f: func { | |
match(t := g(String)) { | |
case a: String => a println() | |
case => "n" println() | |
} | |
} |
#!/bin/sh | |
optirun -c jpeg wine gta_sa.exe |
Problem: Lost private key file ~/.ssh/id_rsa, but could connect to remote hosts via pubkey auth anyway: gpg-agent cached the private key. How to get the private key?
Solution: Use gpg-protect-tool to get the key (you need to know the passphrase of course):
gpgsm --call-protect-tool --p12-export ~/.gnupg/private-keys-v1.d/your-keyfile.key >key.p12
Now you have a PKCS12 file and you can extract the private key like this: