cryptography
Here are 5,896 public repositories matching this topic...
Just for RSA. Do encrypt and decrypt. Include a bold comment that this should not be used for bulk encryption.
It should be the current best practice (fetch), have proper error handling and resource allocation/deallocation and be in the style of a known answer test.
-
Updated
Apr 12, 2021 - JavaScript
-
Updated
Apr 1, 2021 - Go
-
Updated
Apr 20, 2021 - C++
-
Updated
Apr 16, 2021 - JavaScript
-
Updated
Apr 18, 2021 - Swift
-
Updated
Apr 20, 2021 - Python
Hello spoooopyyy hackers
This is a Hacktoberfest only issue!
This is also data-sciency!
The Problem
Our English dictionary contains words that aren't English, and does not contain common English words.
Examples of non-common words in the dictionary:
"hlithskjalf",
"hlorrithi",
"hlqn",
"hm",
"hny",
"ho",
"hoactzin",
"hoactzine
-
Updated
Apr 16, 2021 - TypeScript
-
Updated
Apr 19, 2021 - C++
-
Updated
Apr 20, 2021 - Java
Background
Often Tor only nodes become unreachable while still online which causes long channel downtimes and being unable to fulfill Pool bids.
Your environment
- version of
lnd
v0.12.1 - which operating system (
uname -aon *Nix)
Linux raspberrypi 5.10.17-v8+ #1403 SMP PREEMPT Mon Feb 22 11:37:54 GMT 2021
aarch64 GNU/Linux - version of
btcd,bitcoind, or other back
Currently stratumserver has no unit tests. This will improve the quality and allow future commits to be TDD safe. All units will be tested to ensure the module as a unit itself is tested.
-
Updated
Feb 28, 2021 - Assembly
-
Updated
Apr 20, 2021 - Python
Summary
P2P module should not backoff+retry for connections to peers where there is a chain mismatch, but should expunge the address from the address book and remove it from the list of peers.
Problem Definition
Presently (v0.33; not sure if this is addresses in 0.34), if we connect to a peer on an incorrect chain, the node repeatedly reconnects to this node, and then drops the conn
-
Updated
May 18, 2020 - JavaScript
Problem:
A common pattern is:
GUARD(s2n_stuffer_skip_write(stuffer, bytes_to_write));
uint8_t* ptr = suffer->blob.data + stuffer->write_cursor - bytes_to_write;
which could be simplified.
Solution:
*ptr could be an *out parameter to s2n_stuffer_skip_write
- Does this change what S2N sends over the wire? No.
- Does this change any public APIs? No.
-
Updated
Apr 1, 2021 - JavaScript
Summary
Include recently added validation fields in validations subscription stream messages:
- version
- cookie
- validated hash
Motivation
This information is useful for server operators, for developing who are putting together dashboards, and the community at large.
Solution
-
Updated
Feb 25, 2021
https://scotthelme.co.uk/a-new-security-header-feature-policy/
I guess it will be easy to add, because we certainly don't use any of these features.
Or maybe "gyroscope" or so may be used by the random number generator in sjcl, but that's all.
-
Updated
Apr 16, 2021 - Go
-
Updated
Apr 20, 2021 - C++
-
Updated
Mar 26, 2021 - C++
Improve this page
Add a description, image, and links to the cryptography topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cryptography topic, visit your repo's landing page and select "manage topics."
Would be nice to have a linter to check that only files with a hash-bang may set the executable flag. See #21728
Useful skills:
./test/lintWant to work on this issue?
For guidance on contributing, please read CONTRIBUTING.md before opening your pull request.