Skip to content

Instantly share code, notes, and snippets.

<template>
<div class="container-info">
<div class="info-title">Informações:</div>
<div class="container-rows"
:style="{ 'gridTemplateAreas': createAreas }">
<div :key="row"
:style="{ 'font-weight': !(i % 2) ? 'bold' : 'normal' }"
v-for="(row, i) in createRows">
{{ row }}
</div>
watch: {
isFetching (isFetching) {
const {
google,
googleProps,
point,
$refs: {
input,
map
}
# initialization file (not found)
const m1 = Array.from({ length: 11 }, (k, v) => v)
.reverse()
.slice(0, 9)
const m2 = Array.from({ length: 12 }, (k, v) => v)
.reverse()
.slice(0, 10)
let tempCpf;
let digito;
let soma;
{
"a": 1
}
@nwrox
nwrox / credits.txt
Last active June 18, 2019 12:56
Share memory or session storage in a multi tab environment
https://blog.guya.net/2015/06/12/sharing-sessionstorage-between-tabs-for-secure-multi-tab-authentication/
{
"comments": [
{
"x": "2019/06/05",
"y": "4"
},
{
"x": "2019/05/29",
"y": "6"
},
@nwrox
nwrox / ManagedAuthenticatedEncryptor
Created January 25, 2020 19:50 — forked from badcommandorfilename/ManagedAuthenticatedEncryptor
Standalone (mostly) SP800_108_CTR_HMACSHA512 Key Derivation Function for ASPNetCore cookie sharing
///This is a Frankenstein class that can extract the AES key from a KDK as described in:
/// https://docs.microsoft.com/en-us/aspnet/core/security/data-protection/implementation/subkeyderivation?view=aspnetcore-2.2
///With a bit of luck, this should let an ASP.NET app decrypt cookies generated by an ASPNETCore app
///Still consult https://docs.microsoft.com/en-us/aspnet/core/security/cookie-sharing?view=aspnetcore-2.2 to share cookies
///Credit for most of the code is from various parts of https://github.com/aspnet/AspNetCore/tree/master/src/DataProtection/DataProtection/src
public unsafe class CookieDataProtector : IDataProtector
{
readonly string _base64MasterKey;
var appOptions = _conf.GetSection("AppOptions");
var purposes = appOptions.GetSection("CookieAadPurposes")
.GetChildren();
services.AddCors(options =>
{
options.AddPolicy(CorsPolicyName,
//.AllowCredentials()
builder => builder.AllowAnyHeader()
.AllowAnyMethod()
public byte[] Unprotect(byte[] protectedData)
{
if (protectedData?.Length < 1)
{
return null;
}
var keyId = new byte[16];
var magicHeader = new byte[4];
var purposes = _appOptions.CookieAadPurposes;