#
hsm
Here are 95 public repositories matching this topic...
LizardFS is an Open Source Distributed File System licensed under GPLv3.
linux
c-plus-plus
distributed-systems
replication
gplv3
fault-tolerance
high-performance
distributed-computing
replicas
posix
macosx
hsm
high-availability
software-defined-storage
erasure-coding
nas
qos
geo-replication
hierarchical-storage
lizardfs
-
Updated
Oct 1, 2020 - C++
mbyczkowski
commented
Apr 4, 2019
Instead of having 3 parameters to handle HSM vs non-HSM, signed vs unsigned and testnet vs mainnet, we should we have a single parameter (which picks among 4 profiles).
The 4 profiles would be:
dev-without-hsm= no HSM, btc-testnetdev-with-hsm= HSM, unsigned, btc-testnetstaging= HSM, signed, btc-testnetprod= HSM, signed, btc-mainnet
Highly scalable and high-performance open source PKI (CA and OCSP responder). Minimal dependencies, No-JPA, No-Spring
java
certificate
rest-api
pki
certificate-transparency
hsm
certificate-authority
crl
ocsp
pkcs11
ca
cmp
ocsp-responder
scep
rfc5280
rfc2560
rfc6960
certification-authority
ca-browser-forum
-
Updated
Oct 3, 2020 - Java
Fluent API for creating state machines in C#
fsm
state-machine
unity
game-development
unity3d
finite-state-machine
hsm
nested-states
hierarchical-state-machine
-
Updated
Aug 12, 2019 - C#
Protecting cryptographic signing keys and seed secrets with Multi-Party Computation.
cryptography
blockchain
mpc
hsm
multisig
hardware-security-module
multiparty-computation
multi-signature
-
Updated
Sep 8, 2020 - C
Hardware-based attestation / intrusion detection app for Android devices. It provides both local verification with another Android device via QR codes and optional scheduled server-based verification with support for alert emails. It uses hardware-backed keys and attestation support as the foundation and chains trust to the app for software checks.
android
security
cryptography
monitoring
integrity
hsm
secure-boot
authenticity
attestation
verifiedboot
remote-attestation
secureboot
strongbox
grapheneos
calyxos
-
Updated
Oct 1, 2020 - Java
PKCS#11/Cryptoki support for Python
-
Updated
Oct 2, 2020 - Python
Pure Rust client for YubiHSM2 devices
-
Updated
Feb 29, 2020
Versatile and flexible Python State Machine library
-
Updated
Apr 7, 2019 - Python
Server code for use with the Auditor app: https://github.com/GrapheneOS/Auditor. It provides two services: submission of attestation data samples and a remote attestation implementation with email alerts to go along with the local implementation based on QR code scanning in the app.
android
security
cryptography
monitoring
integrity
hsm
secure-boot
authenticity
attestation
verifiedboot
remote-attestation
secureboot
strongbox
grapheneos
calyxos
-
Updated
Oct 4, 2020 - Java
Easy-to-use high-level library for PKI-enabled applications
-
Updated
Jun 17, 2020 - C
Secure HSM implementation based on MirageOS
-
Updated
Nov 5, 2018 - OCaml
Python statecharts
-
Updated
Jul 16, 2020 - Python
Command line interface application which uses on-device RSA keys (through OpenSC and PKCS#11) to encrypt/decrypt AES key used in turn to perform operation on user data
-
Updated
Jul 9, 2019 - Python
kiishor
opened
Aug 16, 2019
OPTIGA™ Trust M Software Framework
cryptography
aes
ecc
rsa
ecdsa
hsm
hardware-acceleration
public-key-cryptography
ecdhe
brainpool
hardware-security
protected-i2c
security-chip
-
Updated
Sep 28, 2020 - C
SSH CA Client/Server
-
Updated
Jan 24, 2019 - Go
Signatory - A Tezos Remote Signer for signing block-chain operations with private keys using YubiHSM and Azure Key Vault
-
Updated
Sep 23, 2020 - Go
Lustre/HSM Google Drive copytool
-
Updated
Sep 15, 2020 - Python
Improve this page
Add a description, image, and links to the hsm topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the hsm topic, visit your repo's landing page and select "manage topics."
Is your feature request related to a problem? Please describe.
Vault has backends for AWS like dynamo and s3. However to use them you should provide credentials. AWS support 2 solutions to eliminate this. IAM roles for Service Accounts and Instance profile roles.
Due to some unknown reason vault requires more time to start when using dynamic creds than explicit definition keys in s3 block o