I hereby claim:
- I am bencmbrook on github.
- I am bencmbrook (https://keybase.io/bencmbrook) on keybase.
- I have a public key whose fingerprint is 29DF 17D4 2988 819D 2EDB FC38 67E3 C53B 8261 BC94
To claim this, I am signing this object:
type NonUndefined<T> = T extends undefined ? never : T; | |
/** | |
* Create an object with a single property, if the value is not undefined. | |
* Guarantees you don't have `{ myKey: undefined }` in your object. | |
* | |
* @param keyName the name of the key | |
* @param value the value which may be undefined | |
* @returns an object which should be spread into a parent object |
/******************* | |
* Scrollbar | |
*******************/ | |
/** Scrollbar style override */ | |
.scroller { | |
overflow-x: hidden; | |
overflow-y: scroll; | |
border-color: rgba(0, 0, 0, 0); | |
transition-timing-function: ease-in-out; |
const exclusions = [ | |
' Inc.', | |
', Inc.', | |
'The ', | |
'.com', | |
]; | |
/** | |
* Exclude words from matching score. See exclusions above. | |
*/ |
// local | |
import { LanguageKey } from './enums'; | |
/** | |
* Language name should be written in own language | |
*/ | |
export const nativeLanguageNames: Record<LanguageKey, string> = { | |
/* English */ | |
[LanguageKey.En]: 'English', | |
/* Arabic */ |
/* Export a file to be imported by both Node and Browser. | |
* | |
* module.exports = sharedFunction; | |
* AND | |
* export default sharedFunction; | |
*/ | |
// shared-code.js | |
function sharedFunction(x) { | |
return x * 2; |
(function(XHR) { | |
var open = XHR.prototype.open; | |
var send = XHR.prototype.send; | |
XHR.prototype.open = function(method, url, async, user, pass) { | |
this._url = url; | |
open.call(this, method, url, async, user, pass); | |
}; | |
XHR.prototype.send = function(data) { |
// Generates an elliptic curve keypair for the purpose of signing JWTs with ECDSA. | |
const jose = require('node-jose'); | |
const fs = require('fs'); | |
const keystore = jose.JWK.createKeyStore(); | |
async function addNewECDSAKey(kid, keystore) { | |
const kty = "EC"; | |
const crv = "P-384"; |
// https://nodejs.org/api/process.html#process_process_memoryusage | |
let rssMax = heapTotalMax = heapUsedMax = externalMax = 0; | |
let rssMin = heapTotalMin = heapUsedMin = externalMin = Number.MAX_SAFE_INTEGER; | |
readable.on('data', () => { | |
const x = process.memoryUsage(); | |
if (x.rss > rssMax) rssMax = x.rss; | |
if (x.heapTotal > heapTotalMax) heapTotalMax = x.heapTotal; | |
if (x.heapUsed > heapUsedMax) heapUsedMax = x.heapUsed; |
I hereby claim:
To claim this, I am signing this object:
# ECDSA using P-384 and SHA-384 (NIST curve, part of CNSA Suite, and approved to protect "top secret" systems) | |
# https://apps.nsa.gov/iaarchive/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/commercial-national-security-algorithm-suite-factsheet.cfm | |
# https://tools.ietf.org/html/rfc7518#section-3.4 | |
# Generate private key | |
openssl ecparam -name secp384r1 -genkey -noout -out jwtES384key.pem | |
# Generate public key | |
openssl ec -in jwtES384key.pem -pubout -out jwtES384pubkey.pem |