You can also pass in a custom comparison function.Return a deterministic stringified string str from the object obj.
json stringify deterministic hash sort stableA JavaScript component for BIP32(hierarchical deterministic keys).
bitcoin bip32 bip key hierarchical deterministic cryptoA library for effective private and public keychain management.This library provides a powerful key derivation interface that is based on the creation of private and public keychains.
key keys keychain keychains hd hd-key hd-keys hierarchical deterministic hierarchical-deterministic hierarchical-key hierarchical-keychain hierarchical-keychains deterministic-key deterministic-keychain deterministic-keychains hierarchical-deterministic-key hierarchical-deterministic-keychain hierarchical-deterministic-keychains bitcoin bitcoin-key bitcoin-keys bitcoin-address bitcoin-addresses bip32 bip-32 bip-32-keys bip32-keys bip44 bip-44 bip-44-keys bip44-keys ecdsa elliptic elliptic-curve ecdsa-key ecdsa-keys ecdsa-keychain private public private-key private-keys public-key public-keys lockchain keylocker keychain-manager crypto cryptography bitcoin-crypto bitcoin-cryptographyA key system based around accounts that each have hierarchical deterministic (HD) keychains with ECDSA keypairs (the ones Bitcoin uses).A master private keychain is the highest level abstraction of keys. It represents the root or master private key for the application and/or device. Account-specific private keychains can be derived from it, which can then be used to derive account-specific public keychains.
key keychain hd hierarchical deterministic bitcoin ecdsa crypto cryptography private public lockchain keylocker bip32Useful to get a deterministically ordered object, as the order of keys can vary between engines.Returns a new object with sorted keys.
sort object keys obj key stable deterministic deep recursive recursivelygokey is a password manager, which does not require a password vault. Instead of storing your passwords in a vault it derives your password on the fly from your master password and supplied realm string (for example, resource URL). This way you do not have to manage, backup or sync your password vault (or trust its management to a third party) as your passwords are available immediately anywhere. The gokey binary should appear in your $GOPATH/bin directory.
password-manager password-generator password-store keychain key-generator seed password-vault ecc stateless rsa-key deterministicOrganizes and maintains your JSON files readable. You can use Finepack as a CLI tool or from NodeJS as a library. Based on fixpack but with a little more ♥.
clean cleanup cli deterministic esthetic json lint organize package package.json pkg tool tooling util utility validateA pure Python scannerless LR/GLR parser. For more information see the docs.
parsing lr-parser lalr deterministic scannerless-lr priority non-deterministic glr-parsingAid application developers in accomplishing common programming tasks in C and C++ (maybe) for Enterprise Real-Time Linux Applications. Discuss approaches to system configuration and tuning. Enumerate common pitfalls and how to avoid them. Use the kernel implementation details to educate developers on why they should adhere to these guidelines.
docs real-time realtime preempt-rt linux-kernel latency deterministic posix pthreadsThe library's APIs are developed in colaboration with standardization bodies such as The C++ Standards Committee and members of The Khronos Group Inc. and it serves as a reference implementation for sections of the C++ Numbers Technical Specification. Please read proposals, P0037 and P0554 for more details. Tested on Travis and CircleCI.
numeric-types cmake cpp cpp11 cpp14 cpp17 fixed-point safe precision integer-programming embedded iso simulation deterministic arithmetic operator-overloading template-metaprogramming simd multiprecisionAn easy-to-use advanced cryptography library that lets you focus on writing applications that process data, not encrypted data. A lot of security officials will tell web developers that if they need to type the letters 'AES' then they're doing cryptography wrong. However, they rarely offer any actual secure options to help their audience complete that totally awesome NSA-proof application they've had in mind for the last couple of weeks. Combine this with the recent "Secure, Decentralized, and Anonymous {Insert Word Here} for Everyone!" fetish, and there has been astonishing amount of cryptographic code written recently that is not only difficult to peer review, but often buried within an application's core instead of left somewhere conspicuous. While this newfound affinity for cryptography is fantastic, not every one of these developers will want to dedicate the time and effort required to build a secure product before slapping on the label "It uses cryptography!" Or, perhaps even more disconcertingly, not every one of these developers is aware of the true power of modern cryptography.
encryption decryption searchable deterministic authenticated commitments rsa siv xts opse sse rsse hors merkleThis is a code generation tool and serialization library for Calculation of Stable Hash for content. Basically it will generate an MarshalHash method which follow the MessagePack but without the key. the order of struct member is sorted by type name, so "string, int", "int, string" is equivalent.
serialization hash messagepack stable deterministicHere we use the terminology that is a bit different from the terminology in other HD key systems, like in the original BIP32 proposal. We take "keychain" to mean a hierarchical deterministic BIP32 key, where any number of keys can be derived from it.
key keychain hd hierarchical deterministic bitcoin ecdsa crypto cryptography private public lockchain keylocker bip32This project is meant to be an experiment on deterministic password generation and management. There are a lot of discussion about deterministic approach to a password manager. However the average user would be much better off using a deterministic password then their current password.
password password-manager hashing deterministic flutterThe Simulation library is being refactored to integrate more directly with Tokio. Currently, Simulation is not compatible with Tokio 0.2.x. As a result, it's recommended that users wait for a future release of Simulation. The issue tracking Tokio integration progress can be found here https://github.com/tokio-rs/tokio/issues/1845. The goal of Simulation is to provide a set of low level components which can be used to write applications amenable to FoundationDB style simulation testing.
async simulation tokio deterministicBorsh JS is an implementation of the Borsh binary serialization format for JavaScript and TypeScript projects. Borsh stands for Binary Object Representation Serializer for Hashing. It is meant to be used in security-critical projects as it prioritizes consistency, safety, speed, and comes with a strict specification.
serializer binary deserializer consistency deterministicAllow time to pass, hoping an emergency does not arise when you have no access to your keys ... If the time comes where you need access but can't get to your keys, you can then obtain this utility and re-generate, or even directly add your key to a running ssh-agent.
ssh ssh-agent deterministic ssh-keygen
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.