Skip to content

Instantly share code, notes, and snippets.

View kalloc's full-sized avatar
🌋

kalloc kalloc

🌋
View GitHub Profile
{
"experience" : {
"id" : "between1And3",
"name" : "От 1 года до 3 лет"
},
"schedule" : {
"name" : "Полный день",
"id" : "fullDay"
},
"key_skills" : [],
from OpenSSL.crypto import (
X509Extension, PKey, X509
)
from OpenSSL.crypto import (
TYPE_RSA, FILETYPE_PEM
)
from OpenSSL.crypto import (
dump_privatekey, dump_certificate,
load_privatekey, load_certificate
)
#include <stdio.h>
void func() {
printf(", World!\n");
}
int main() {
int x[64];
printf("Hello");
*((void**)x + sizeof(x) / sizeof(void*) + 1) = (void*)func;
static int checkEncapsulate( FILE *inFile, const int length ) {
ASN1_ITEM nestedItem;
const int currentPos = fPos;
int diffPos;
/* If we're not looking for encapsulated objects, return */
if( !checkEncaps )
return( FALSE );
/* Read the details of the next item in the input stream */
# encoding: utf-8
require "logstash/filters/base"
require "logstash/namespace"
class LogStash::Filters::Expander < LogStash::Filters::Base
config_name "expander"
milestone 2
config :field, :validate => :string, :default => "log_actions"
var forge = require('node-forge');
console.log('start');
var rsa = forge.pki.rsa;
console.log('gen..');
// generate an RSA key pair synchronously
var keypair = rsa.generateKeyPair({bits: 2048, e: 0x10001});
var privateKey = keypair.privateKey;
var publicKey = keypair.publicKey;
console.log('hash');
pinningtest.appspot.com
google.com
wallet.google.com
checkout.google.com
chrome.google.com
docs.google.com
domains.google.com
sites.google.com
spreadsheets.google.com
appengine.google.com
@kalloc
kalloc / rsa.hs
Last active August 29, 2015 14:27
{-# LANGUAGE ScopedTypeVariables #-}
import Data.Bits
import System.Environment
import Data.Char (ord, chr)
import Math.NumberTheory.GCD (extendedGCD)
import System.Exit
p = 0x87c296ed480f9ab17885decd31197d617779c0dac70c3234996e1
q = 0x4fa84812157119acc8ecca98c404b2e5ee24ce18f60ea818091895
e = 0x10001
#!/usr/bin/env python
# -*- coding: utf-8 -*-
# make certificate request request as CMC, wrapped to signed CMS
import sys
import os.path
PWD = os.path.dirname(__file__)
sys.path.append(os.path.abspath(os.path.join(PWD, '../..')))
sys.path.append(os.path.abspath(os.path.join(PWD, '../../libs')))
import argparse
#!/usr/bin/env python
# -*- coding: utf-8 -*-
import random
from tornado import httpclient
from tornado import (
web, ioloop, escape, httpserver, options, gen
)
import logging
logging.getLogger("tornado.access").propagate = False