I hereby claim:
- I am joostd on github.
- I am joost (https://keybase.io/joost) on keybase.
- I have a public key whose fingerprint is 2221 3B0B 74FE 7AAD 1F3F 3F45 5928 0105 5F59 47EA
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
<xsl:stylesheet | |
version="1.0" | |
xmlns:xsl="http://www.w3.org/1999/XSL/Transform" | |
xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" | |
xmlns:ds="http://www.w3.org/2000/09/xmldsig#" | |
> | |
<!-- | |
Convert SAML 2.0 IdP Metadata into Microsoft Azure Powershell commands for Office 365 federated domain configuration | |
example usage: |
Verifying that +joostd is my blockchain ID. https://onename.com/joostd |
# src: https://stackoverflow.com/questions/23233252/broken-references-in-virtualenvs | |
brew install findutils # macos find doesn't have xtype | |
gfind venv/ -type l -xtype l -delete | |
virtualenv venv -p python3 |
//usr/bin/env jshell "$0" "$@"; exit $? | |
// install dependencies: | |
// wget https://repo1.maven.org/maven2/org/jmrtd/jmrtd/0.7.2/jmrtd-0.7.2.jar | |
// wget http://bouncycastle.org/download/bcprov-jdk15on-160.jar | |
// wget https://repo1.maven.org/maven2/net/sf/scuba/scuba-sc-j2se/0.0.18/scuba-sc-j2se-0.0.18.jar | |
// wget https://repo1.maven.org/maven2/net/sf/scuba/scuba-smartcards/0.0.18/scuba-smartcards-0.0.18.jar | |
/env --class-path scuba-sc-j2se-0.0.18.jar:scuba-smartcards-0.0.18.jar:jmrtd-0.7.2.jar:bcprov-jdk15on-160.jar | |
/env --add-modules java.smartcardio,java.xml.bind |
{ | |
"issuer": "https://connect.test.surfconext.nl", | |
"authorization_endpoint": "https://connect.test.surfconext.nl/oidc/authorize?response_mode=query&claims=%7B%22id_token%22%3A%7B%22email%22%3Anull%7D%7D", | |
"token_endpoint": "https://connect.test.surfconext.nl/oidc/token", | |
"userinfo_endpoint": "https://connect.test.surfconext.nl/oidc/userinfo", | |
"introspect_endpoint": "https://connect.test.surfconext.nl/oidc/introspect", | |
"jwks_uri": "https://connect.test.surfconext.nl/oidc/certs", | |
"response_types_supported": [ | |
"code", | |
"token", |
EMAIL=you@example.edu | |
CN=www.example.edu | |
ssl-types.json: | |
curl -s https://cert-manager.com/api/ssl/v1/types -H @headers > ssl-types.json | |
key.pem: | |
openssl genrsa -out key.pem 2048 | |
csr.pem: key.pem |
cbor = Dissector.get("cbor") | |
iso7816 = Dissector.get("iso7816") | |
ctap_proto = Proto("ctaphid","ctap hid") | |
-- Field Extractor | |
direction_fe = Field.new("usb.endpoint_address.direction") | |
udp_srcport_fe = Field.new("udp.srcport") | |
CTAPHID_COMMAND_CODE = { | |
[0x03]='CTAPHID_MSG', | |
[0x10]='CTAPHID_CBOR', |
<script> | |
let abortController; | |
function start() { | |
abortController = new AbortController(); | |
// setTimeout(() => abortController.abort(), 5000); // automatically abort after 5 seconds | |
abortController.signal.addEventListener( 'abort', () => { | |
if(abortController.signal.aborted) console.log("event: signal aborted"); | |
}); |
# install dependencies: | |
# brew install step jq | |
.PHONY: all | |
all: aaguid.tsv | |
cat aaguid.tsv | sort -k2 | |
md.jwt: | |
curl -Ls https://mds3.fidoalliance.org/ --output md.jwt |