create different ssh key according the article Mac Set-Up Git
$ ssh-keygen -t rsa -C "your_email@youremail.com"
| import Foundation | |
| let json = """ | |
| { | |
| "user_id": 1, | |
| "user_name": "magicien", | |
| "friends": [ | |
| { | |
| "user_id": 2, | |
| "is_best_friend": true |
| import Foundation | |
| let json = """ | |
| { | |
| "user_id": 1, | |
| "user_name": "magicien", | |
| "friends": [ | |
| { | |
| "user_id": 2, | |
| "is_best_friend": true |
| import Foundation | |
| let json = """ | |
| { | |
| "user_id": 1, | |
| "user_name": "magicien", | |
| "url": "http://darkhorse2.0spec.jp" | |
| } | |
| """.data(using: .utf8)! |
| public func Cross(_ q1: SCNQuaternion, _ q2: SCNQuaternion) -> SCNQuaternion { | |
| return SCNQuaternion( | |
| q1.w * q2.x + q1.x * q2.w + q1.y * q2.z - q1.z * q2.y, | |
| q1.w * q2.y - q1.x * q2.z + q1.y * q2.w + q1.z * q2.x, | |
| q1.w * q2.z + q1.x * q2.y - q1.y * q2.x + q1.z * q2.w, | |
| q1.w * q2.w - q1.x * q2.x - q1.y * q2.y - q1.z * q2.z | |
| ) | |
| } |
| import Foundation | |
| let json = """ | |
| { | |
| "nodes": [ | |
| { | |
| "extensions": { | |
| "KHR_materials_common": { | |
| "light": 0 | |
| } |
| import Foundation | |
| import SceneKit | |
| let json = """ | |
| { | |
| "position": [2.0, 5.0, 3.0], | |
| "rotation": [0.0, 0.73, 0.0, 0.73] | |
| } | |
| """.data(using: .utf8)! |
| let hasBlobConstructor = typeof(Blob) !== 'undefined' && (function () { | |
| try { | |
| return Boolean(new Blob()); | |
| } catch (e) { | |
| return false; | |
| } | |
| }()); | |
| let hasArrayBufferViewSupport = hasBlobConstructor && typeof(Uint8Array) !== 'undefined' && (function () { | |
| try { |
create different ssh key according the article Mac Set-Up Git
$ ssh-keygen -t rsa -C "your_email@youremail.com"
| # generate a new pgp key: (better to use gpg2 instead of gpg) | |
| gpg --gen-key | |
| # maybe you need some random work in your OS to generate a key. so run this command: `find ./* /home/username -type d | xargs grep some_random_string > /dev/null` | |
| # check current keys: | |
| gpg --list-secret-keys --keyid-format LONG | |
| # export private key in gpg: | |
| gpg --export-secret-key -a "your_username" |