Result:
found more than 606 distributions - search limited to the first 2001 files matching your query ( run in 0.840 )


Authen-Simple-DBI

 view release on metacpan or  search on metacpan

lib/Authen/Simple/DBI.pm  view on Meta::CPAN

        return 0;
    }

    unless ( $self->check_password( $password, $encrypted ) ) {

        $self->log->debug( qq/Failed to authenticate user '$username'. Reason: 'Invalid credentials'/ )
          if $self->log;

        return 0;
    }

 view all matches for this distribution


Authen-Simple-DBM

 view release on metacpan or  search on metacpan

lib/Authen/Simple/DBM.pm  view on Meta::CPAN

        return 0;
    }

    unless ( $self->check_password( $password, $encrypted ) ) {

        $self->log->debug( qq/Failed to authenticate user '$username'. Reason: 'Invalid credentials'/ )
          if $self->log;

        return 0;
    }

 view all matches for this distribution


Authen-Simple-Gmail

 view release on metacpan or  search on metacpan

t/00.load.t  view on Meta::CPAN

    skip 'Please specify a valid username and password (in that order on a line by itself) in .gmail.test.config', 2 unless $username && $password;

  SKIP: {
        skip 'These tests require connectivity to pop.gmail.com over port 995.', 2 unless detect_net( 'pop.gmail.com', 995 );

        ok( $gmail_auth->authenticate( $username, $password ), 'authenticate() valid credentials return true' );

        ok( !$gmail_auth->authenticate( $username, $password . $$ . time ), 'authenticate() invalid credentials return false' );
    }
}

 view all matches for this distribution


Authen-Simple-HTTP

 view release on metacpan or  search on metacpan

lib/Authen/Simple/HTTP.pm  view on Meta::CPAN


    # This implementation is very hackish, however I could not find a cleaner
    # way to implement this without forking a lot of code from LWP::UserAgent.
    # Please let me know if you have any ideas of improvements.

    my $override = sprintf '%s::get_basic_credentials', ref $self->agent;
    my $response = undef;
    my $url      = $self->url;

    # First make sure we receive a challenge

lib/Authen/Simple/HTTP.pm  view on Meta::CPAN

          if $self->log;

        return 0;
    }

    # We have a challenge, issue a new request with credentials.

    {
        no strict   'refs';
        no warnings 'redefine';

lib/Authen/Simple/HTTP.pm  view on Meta::CPAN

        $response = $self->agent->head($url);
    }

    if ( $response->code == 401 ) {

        $self->log->debug( qq/Failed to authenticate user '$username' using url '$url'. Reason: 'Invalid credentials'/ )
          if $self->log;

        return 0;
    }

 view all matches for this distribution


Authen-Simple-LDAP

 view release on metacpan or  search on metacpan

lib/Authen/Simple/LDAP.pm  view on Meta::CPAN

          if $self->log;

        return 0;
    }

    my ( @credentials, $message, $search, $entry, $filter, $dn );

    @credentials = $self->binddn ? ( $self->binddn, password => $self->bindpw ) : ();
    $message     = $connection->bind(@credentials);

    if ( $message->is_error ) {

        my $error  = $message->error;
        my $binddn = $self->binddn;

lib/Authen/Simple/LDAP.pm  view on Meta::CPAN


    binddn => 'uid=proxy,cn=users,dc=company,dc=com'

=item * bindpw 

The credentials to bind with.

    bindpw => 'secret'

=item * basedn

 view all matches for this distribution


Authen-Simple-NIS

 view release on metacpan or  search on metacpan

lib/Authen/Simple/NIS.pm  view on Meta::CPAN


    my $encrypted = ( split( /:/, $entry ) )[1];

    unless ( $self->check_password( $password, $encrypted ) ) {

        $self->log->debug( qq/Failed to authenticate user '$username'. Reason: 'Invalid credentials'/ )
          if $self->log;

        return 0;
    }

 view all matches for this distribution


Authen-Simple-Passwd

 view release on metacpan or  search on metacpan

lib/Authen/Simple/Passwd.pm  view on Meta::CPAN

        next if /^#/;
        next if /^\s+/;

        chop;

        my (@credentials) = split( /:/, $_, 3 );

        if ( $credentials[0] eq $username ) {

            $encrypted = $credentials[1];

            $self->log->debug( qq/Found user '$username' in passwd '$path'./ )
              if $self->log;

            last;

lib/Authen/Simple/Passwd.pm  view on Meta::CPAN

        return 0;
    }

    unless ( $self->check_password( $password, $encrypted ) ) {

        $self->log->debug( qq/Failed to authenticate user '$username'. Reason: 'Invalid credentials'/ )
          if $self->log;

        return 0;
    }

 view all matches for this distribution


Authen-Simple-SMB

 view release on metacpan or  search on metacpan

lib/Authen/Simple/SMB.pm  view on Meta::CPAN

        $self->log->error( qq/Failed to authenticate user '$username' using domain '$domain'. Reason: 'Received a Protocol Error'/ )
          if $self->log;
    }

    if ( $status == 3 ) { # NTV_LOGON_ERROR
        $self->log->debug( qq/Failed to authenticate user '$username' using domain '$domain'. Reason: 'Invalid credentials'/ )
          if $self->log;
    }

    return 0;
}

 view all matches for this distribution


Authen-Simple-Twitter

 view release on metacpan or  search on metacpan

lib/Authen/Simple/Twitter.pm  view on Meta::CPAN

=cut

sub check {
    my ( $self, $username, $password ) = @_;

    $self->net_twitter->credentials(
        $username, $password,
        $self->net_twitter->{apihost},
        $self->net_twitter->{apirealm}
    );

    if ( my $response = $self->net_twitter->verify_credentials() ) {

        $self->log->debug(qq/Successfully authenticated user '$username'./)
          if $self->log;

        return 1;

 view all matches for this distribution


Authen-Simple-WebForm

 view release on metacpan or  search on metacpan

examples/ex1.pl  view on Meta::CPAN

my $webform = Authen::Simple::WebForm->new(
    'log'               => $log,
    initial_url         => 'http://freshmeat.net/session/new?return_to=/',
    login_url           => 'http://freshmeat.net/session',
    login_expect        => 'href="/logout"',
    login_expect_cookie => 'user_credentials',
    username_field      => 'user_session[login]',
    password_field      => 'user_session[password]',
    extra_fields        => [
        'commit' => 'Log in!',
        'user_session[remember_me]' => 0,

 view all matches for this distribution


Authen-SimplePam

 view release on metacpan or  search on metacpan

SimplePam.pm  view on Meta::CPAN

    unless (defined ($result));

  if    ( $result == 0  ) { return "Authen::PAM error"                       }
  elsif ( $result == 1  ) { return "success"                                 }
  elsif ( $result == 2  ) { return "failure"                                 }
  elsif ( $result == 3  ) { return "insuficient credentials"                 }
  elsif ( $result == 4  ) { return "authentication information unavailable"  }
  elsif ( $result == 5  ) { return "user unknown"                            }
  elsif ( $result == 6  ) { return "maximum tries"                           }
  elsif ( $result == 7  ) { return "unknown error"                           }
  elsif ( $result == 8  ) { return "authentication error"                    }

SimplePam.pm  view on Meta::CPAN

  elsif ( $result == 15 ) { return "symbol not found"                        }
  elsif ( $result == 16 ) { return "memory buffer error"                     }
  elsif ( $result == 17 ) { return "the password should be changed"          }
  elsif ( $result == 18 ) { return "user account has expired"                }
  elsif ( $result == 19 ) { return "cannot make/remove an entry for the specified session" }
  elsif ( $result == 20 ) { return "cannot retrieve users credentials"       }
  elsif ( $result == 21 ) { return "user credentials expired"                }
  elsif ( $result == 22 ) { return "no pam module specific data is present"  }
  elsif ( $result == 23 ) { return "conversation error"                      }
  elsif ( $result == 24 ) { return "ignore underlying account module"        }
  elsif ( $result == 25 ) { return "critical error"                          }
  elsif ( $result == 26 ) { return "user authentication has expired"         }

SimplePam.pm  view on Meta::CPAN


The password does not match.

=item 3 Insufficient Credentials.

For some reason the application does not have enough credentials to authenticate the user.
E.g. A non-root user trying to authenticate/validate the root user password.

=item 4 Authentication information unavailable.

The modules were not able to access the authentication information. This might be due to a network or hardware failure etc.

 view all matches for this distribution


AxKit2

 view release on metacpan or  search on metacpan

lib/AxKit2/Client.pm  view on Meta::CPAN

    }
    elsif ($code == UNAUTHORIZED) {
        $self->write("<p>This server could not verify that you\n" .
                       "are authorized to access the document\n" .
                       "requested.  Either you supplied the wrong\n" .
                       "credentials (e.g., bad password), or your\n" .
                       "browser doesn't understand how to supply\n" .
                       "the credentials required.</p>\n");
    }
    elsif ($code == FORBIDDEN) {
        $self->write("<p>You don't have permission to access " . 
                     xml_escape($self->headers_in->uri) .
                     "\non this server.</p>\n");

 view all matches for this distribution


Azure-AD-Auth

 view release on metacpan or  search on metacpan

lib/Azure/AD/ClientCredentials.pm  view on Meta::CPAN

    return if $self->expiration >= time;

    my $auth_response = $self->ua->post_form(
      $self->token_endpoint,
      {
        grant_type    => 'client_credentials',
        client_id     => $self->client_id,
        client_secret => $self->secret_id,
        resource      => $self->resource_id,
      }
    );

 view all matches for this distribution


BGPmon-Analytics-db-1

 view release on metacpan or  search on metacpan

bin/bgpmon_analytics_db_import  view on Meta::CPAN


BEGIN{
	our $VERSION = '1.07';
};

#step 1: set up script args (DB name/credentials, data source, log file name,
#config file name)
#step 2: fetch data from the specified data source
#step 3: convert the XML to hashes
#step 4: grab the fields I'm interested in
#step 5: insert fields into DB staging table

bin/bgpmon_analytics_db_import  view on Meta::CPAN

              );

use constant MAX_UPDATES_PER_INJECT => 1000;

#Define parameters for logging (filename, level, use syslog)
#Define parameters for system state (DB name,DB credentials, config filename)
#Define parameters for data retrieval (source, Fetch parameters)
my @params = (
    {
        'Name' => BGPmon::Configure::CONFIG_FILE_PARAMETER_NAME,
        'Type' => BGPmon::Configure::FILE,

 view all matches for this distribution


Backblaze-B2

 view release on metacpan or  search on metacpan

examples/authenticate.pl  view on Meta::CPAN

use JSON::XS;
use Backblaze::B2;
use Getopt::Long;

GetOptions(
    'c|credentials:s' => \my $credentials_file,
    'o|application-credentials:s' => \my $app_credentials_file,
);

$app_credentials_file ||= './app-credentials.json';

=head1 SYNOPSIS

=head1 SEE ALSO

examples/authenticate.pl  view on Meta::CPAN

my $b2 = Backblaze::B2->new(
    version => 'v1',
    log_message => sub { warn sprintf "[%d] %s\n", @_; },
);

my $credentials = $b2->read_credentials( $credentials_file );

use Data::Dumper;
my ($app_credentials) = $b2->authorize_account(
    %$credentials
);

open my $fh, '>', $app_credentials_file
    or die "Couldn't write credentials to '$app_credentials_file'";
binmode $fh;
print {$fh} encode_json( $app_credentials );

 view all matches for this distribution


Backblaze-B2V2Client

 view release on metacpan or  search on metacpan

lib/Backblaze/B2V2Client.pm  view on Meta::CPAN


=head2 Testing Your Credentials

During install, this module will attempt to connect to B2 and download
a 16KB file into memory. To test using your B2 account
credentials, set these environmental varables prior to attempting
to install:

	B2_APP_KEY_ID - The application key ID for the key you wish to test.
	B2_APP_KEY - The application key -- is never displayed in the B2 UI.
	B2_ACCT_ID - Your account ID; will be the ID of your master key

 view all matches for this distribution


Bb-Collaborate-Ultra

 view release on metacpan or  search on metacpan

lib/Bb/Collaborate/Ultra.pm  view on Meta::CPAN

    use Bb::Collaborate::Ultra::Connection;
    use Bb::Collaborate::Ultra::Session;
    use Bb::Collaborate::Ultra::User;
    use Bb::Collaborate::Ultra::LaunchContext;

	my %credentials = (
	  issuer => 'OUUK-REST-API12340ABCD',
	  secret => 'ABCDEF0123456789AA',
	  host => 'https://xx-csa.bbcollab.com',
	);

	# connect to server
	my $connection = Bb::Collaborate::Ultra::Connection->new(\%credentials);
	$connection->connect;

	# create a virtual classroom, starts now runs, for 15 minutes
	my $start = time() + 60;
	my $end = $start + 900;

 view all matches for this distribution


Bb-Collaborate-V3

 view release on metacpan or  search on metacpan

t/Bb/Collaborate/V3.pm  view on Meta::CPAN

    my $pass = $ENV{'BBC_TEST_PASS'.$suffix};
    my $url  = $ENV{'BBC_TEST_URL'.$suffix};

    if ($url) {
	my $uri_obj = URI->new($url, 'http');
	my $userinfo = $uri_obj->userinfo; # credentials supplied in URI

	if ($userinfo) {
	    my ($uri_user, $uri_pass) = split(':', $userinfo, 2);
	    $user ||= URI::Escape::uri_unescape($uri_user);
	    $pass ||= URI::Escape::uri_unescape($uri_pass)

 view all matches for this distribution


BeamerReveal

 view release on metacpan or  search on metacpan

bin/awspolly.pl  view on Meta::CPAN

version 20260408.1240

=head1 DESCRIPTION

The script reads the text file, and converts it to a speech audio file using
B<AWS Polly>. You need to setup the correct credentials yourself (in F<.aws/credentials>)
and also the correct region and output format in a configuration file (in F<.aws/config>).

=head1 NAME

awspolly.pl - convert text to speech

 view all matches for this distribution


Beekeeper

 view release on metacpan or  search on metacpan

lib/Beekeeper/Client.pm  view on Meta::CPAN

sub __use_authorization_token {
    my ($self, $token) = @_;

    # Using a hashing function makes harder to access the wrong worker pool by mistake,
    # but it is not an effective access restriction: anyone with access to the backend
    # bus credentials can easily inspect and clone auth data tokens

    my $salt = $self->{_CLIENT}->{auth_salt};

    my $adata_ref = \$self->{_CLIENT}->{auth_data};

 view all matches for this distribution


Benchmark-DKbench

 view release on metacpan or  search on metacpan

data/wiki2.html  view on Meta::CPAN




<script type="text/javascript" id="" src="./Star Trek _ Memory Alpha _ Fandom_files/17632281258.js"></script>
<script type="text/javascript" id="">(function(){window.ads&&window.ads.pushToConsentQueue&&window.ads.pushToConsentQueue(function(a){if(a&&(!a.geoRequiresConsent||a.gdprConsent)){var d=mw.config.get("wgUserId");d&&(a=document.createElement("script")...
Sailthru.init({customerId:g,autoTrackPageview:!1,useStoredTags:!1});document.cookie.match(/^(.*;)?\s*sailthru_hid\s*=\s*[^;]+(.*)?$/)?e():fetch(mw.config.get("wgServicesExternalDomain")+"email-service/sailthru/user-cookie",{method:"POST",credentials:...
h.cookie+"; expires\x3d"+c;e()})})},document.head.append(a))}})})();</script>
<script type="text/javascript" id="">(function(){function d(){return[]}"undefined"!==typeof module&&(module.exports=d);for(var c=[],a=0;a<c.length;a++){var b=document.createElement("script");b.setAttribute("src",c[a]);b.setAttribute("async","");docum...
<script type="text/javascript" id="">(function(){var a=[{thanksTitle:"Thanks for visiting Fandom.",thanksSubtitle:"Come back to visit more communities like this.",thanksCopyColor:"00d6d6",thanksBackgroundColor:"002A32",thanksCloseButtonColor:"00d6d6"...
thanksBackgroundColor:"DFEC24",thanksCloseButtonColor:"002A32"},{thanksTitle:"Thanks for visiting Fandom.",thanksSubtitle:"Come back to visit more communities like this.",thanksCopyColor:"002A32",thanksBackgroundColor:"DFEC24",thanksCloseButtonColor:...
var c=!0,b=Math.floor(Math.random()*(a.length-0+1))+0;a=a[b];a||(c=!1,a={variant:"control"});window.dataLayer.push({event:"thanks-variant",action:"picked",details:JSON.stringify(a),variant_num:b});b=Object.keys(a);for(key in b)window._pf(key,a[key]);...

 view all matches for this distribution


Benchmark-Perl-Formance-Cargo

 view release on metacpan or  search on metacpan

share/SpamAssassin/easy_ham/00793.6da29475fba399c38bb0a93efabcae5c  view on Meta::CPAN

ordinary American receives from either their employer or the government.

It should be pointed out that while many of these Indian corporations are
ineptly run, and mostly provide sinecures for other Indians, a minority are
very smartly managed and a few hire non-Indian business executives with good
credentials to run their business divisions.  An example of this is the
Haida Corporation, which while having less 1,000 tribal shareholders, has
billions of dollars in assets and the various corporations they own have
gross revenues in the $200-300 million range (and growing).  Yet the
dividend paid out is strictly controlled, about $20k in this particular
case, and they engaged in a practice of waiting a couple decades before

 view all matches for this distribution


Benchmark-Report-GitHub

 view release on metacpan or  search on metacpan

lib/Benchmark/Report/GitHub.pm  view on Meta::CPAN

	UPLOAD: {
		my $orig = Cwd::cwd();
		chdir "$project.wiki";
		system("git config user.name '$ENV{GH_NAME}'");
		system("git config user.email '$ENV{GH_EMAIL}'");
		system("git config credential.helper 'store --file=.git/credentials'");
		open my $cred, '>', '.git/credentials';
		print $cred "https://$ENV{GH_TOKEN}:\@github.com\n";
		close $cred;
		system("git add .");
		system("git commit -a -m 'benchmarks for $job_num'");
		system("git push --all");
		system("rm '.git/credentials'");
		chdir($orig);
		File::Path::remove_tree("$project.wiki");
	}
	
	return "https://github.com/$owner/$project/wiki/$page";

 view all matches for this distribution


BigIP-iControl

 view release on metacpan or  search on metacpan

lib/BigIP/iControl.pm  view on Meta::CPAN


	my $sub_detail_list= {
				name				=> $args{name},
				event_type_list			=> [@{$args{event_type}}],
				url				=> $args{url},
				url_credentials			=> {
									auth_mode	=> 'AUTHMODE_NONE',
									#username	=> $args{username},
									#password	=> $args{password}
								},
				ttl				=> $args{ttl},

 view all matches for this distribution


Bing-Translate

 view release on metacpan or  search on metacpan

lib/Bing/Translate.pm  view on Meta::CPAN

        my $secret = $self->{'secret'};

        my $ua = LWP::UserAgent->new() or die;
        $ua->ssl_opts (verify_hostname => 0);
        my $url = "https://datamarket.accesscontrol.windows.net/v2/OAuth2-13/";
        my $request = POST( $url, [ grant_type => "client_credentials", scope => "http://api.microsofttranslator.com", client_id => "$id", client_secret => "$secret" ] );
#       my $content = $ua->request($request)->as_string() or die;
        my $response = $ua->request($request);
        my $content;
        my $authToken;
        if ($response->is_success) {

 view all matches for this distribution


Bintray-API

 view release on metacpan or  search on metacpan

lib/Bintray/API/Session.pm  view on Meta::CPAN

    );

    # Set API URL
    $opts{apiurl} = 'https://bintray.com/api/v1';

    # Check for credentials
    if ( $opts{username} and $opts{apikey} ) {
        $opts{hascreds} = 1;
    }

    # Init HTTP Client

 view all matches for this distribution


Bio-CIPRES

 view release on metacpan or  search on metacpan

lib/Bio/CIPRES.pm  view on Meta::CPAN

   
    # create URI object for easier protocol/port parsing
    $self->{uri} = URI->new( $self->{cfg}->{url} );

    my $netloc = join ':', $self->{uri}->host, $self->{uri}->port;
    $self->{agent}->credentials(
        $netloc,
        $DOMAIN,
        $self->{cfg}->{user},
        $self->{cfg}->{pass}
    );

lib/Bio/CIPRES.pm  view on Meta::CPAN

=back

=head1 TESTING

The distribution can be installed and tested in the usual ways. Note however,
that running the full test suite requires CIPRES REST credentials (not shipped
with package for obvious reasons). If a credentials file is found at
"$ENV{HOME}/.cipres", the full test suite will be run -- otherwise only
rudimentary tests will be run and most will be skipped.

=head1 CAVEATS AND BUGS

 view all matches for this distribution


Bio-DB-NCBIHelper

 view release on metacpan or  search on metacpan

lib/Bio/DB/Taxonomy/entrez.pm  view on Meta::CPAN


=head2 authentication

 Title   : authentication
 Usage   : $db->authentication($user,$pass)
 Function: Get/Set authentication credentials
 Returns : Array of user/pass
 Args    : Array or user/pass

=cut

 view all matches for this distribution


Bio-Das

 view release on metacpan or  search on metacpan

Das.pm  view on Meta::CPAN

Create a new Bio::Das object, with the indicated timeout and optional
callback for authentication.  The timeout will be used to decide when
a server is not responding and to return a "can't connect" error.  Its
value is in seconds, and can be fractional (most systems will provide
millisecond resolution).  The authentication callback will be invoked
if the remote server challenges Bio::Das for authentication credentials.

Aggregators are used to build multilevel hierarchies out of the raw
features in the DAS stream.  For a description of aggregators, see
L<Bio::DB::GFF>, which uses exactly the same aggregator system as
Bio::Das.

 view all matches for this distribution


Bio-EUtilities

 view release on metacpan or  search on metacpan

lib/Bio/DB/EUtilities.pm  view on Meta::CPAN


=head2 authentication

 Title   : authentication
 Usage   : $db->authentication($user,$pass)
 Function: Get/Set authentication credentials
 Returns : Array of user/pass
 Args    : Array or user/pass

=head2 delay_policy

 view all matches for this distribution


( run in 0.840 second using v1.01-cache-2.11-cpan-39bf76dae61 )