Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
tree: 70ecd00390
Commits on Dec 19, 2012
  1. @drahosp

    Updated travis hook

    drahosp authored
Commits on Aug 25, 2012
  1. @drahosp

    Updated version in dist.info

    drahosp authored
  2. @drahosp

    Updated cmake macros

    drahosp authored
Commits on Apr 24, 2012
  1. @davidm
  2. @davidm
  3. @davidm

    cmake: update dist.cmake

    davidm authored
Commits on Apr 20, 2012
  1. @mkottman

    Merge pull request #16 from racker/x509_cert-fix-windows

    mkottman authored
    x509_cert_pubkey: windows build fix
  2. @mkottman

    Merge pull request #19 from hasufell/master

    mkottman authored
    Revised build system - autotools
  3. autoreconf

    hasufell authored
  4. add pkgconfig file

    hasufell authored
    luvit needs the header file being installed when not using bundled sources
    this makes it easier for us to patch the luvit build system and point it
    to the correct lib/header
  5. fix test.lua

    hasufell authored
  6. add autotools generated files

    hasufell authored
    libtoolize --copy --force --install --automake && aclocal -I m4 && autoconf && autoheader && automake --add-missing --copy
  7. add autotools build system

    hasufell authored
    base files added
  8. add docs

    hasufell authored
  9. add cmake build system from LuaDist

    hasufell authored
    dist.cmake patched to work with autotools
    added EXCLUDE patterns for Makefile* in install-rules
  10. remove old build systems

    hasufell authored
Commits on Apr 3, 2012
  1. @drahosp

    Adding travis build

    drahosp authored
Commits on Mar 21, 2012
  1. @philips

    x509_cert_pubkey: windows build fix

    philips authored
    move declaration to the top to fix windows
Commits on Mar 20, 2012
  1. @mkottman

    Merge pull request #15 from racker/fix-rsa-openssl-mismatch

    mkottman authored
    Fix rsa openssl mismatch
  2. pkey: to_pem: check return codes

    Brandon Philips authored
    check the return codes of wrote_bio_PrivateKey for any error.
  3. pkey: use DSA and RSA PrivateKey functions in to_pem

    Brandon Philips authored
    Detect what type of key we are dealing with and use the right to_pem
    function. This way we match the enconding that the openssl dsa|rsa apps
    use for certificates.
Commits on Mar 14, 2012
  1. docs: add x509_cert and x509_ca

    Brandon Philips authored
    add docs for the x509_cert and x509_ca objects.
  2. x509_cert: add x509_cert to read out pubkey

    Brandon Philips authored
    With this patch we can now do things like verify a x509 cert against a x509_ca
    then extract its pubkey and test a message signature.
    
        cert = crypto.x509_cert()
        cert:from_pem(server_cert)
        kpub = cert:pubkey()
        message = 'Hello world'
        verified = crypto.verify('md5', message, signature, kpub)
Commits on Mar 6, 2012
  1. @mkottman
Commits on Mar 1, 2012
  1. @mkottman
  2. @mkottman
  3. @mkottman

    Bump version to 0.3.0

    mkottman authored
  4. @mkottman
Commits on Feb 29, 2012
  1. @mkottman
Commits on Feb 8, 2012
  1. lcrypto: make it build under windows

    Brandon Philips authored
    Move all of the variable definitions to the top.
Commits on Feb 4, 2012
  1. lcrypto.c: return true if x509_ca:add_pem is OK

    Brandon Philips authored
    return a boolean instead of nothing on success
  2. lcrypto.c: remove inlines

    Brandon Philips authored
    inlines at best are a micro optimization and all modern compilers figure
    it out. On GCC 4.4 the exact same code is output with and without the
    inline. And as a bonus this all should compile under Windows now.
Commits on Feb 3, 2012
  1. @philips

    Merge pull request #2 from racker/add-x509-ca-verify

    philips authored
    Add x509 ca verify
  2. x509_ca: initial commit

    Brandon Philips authored
    Initial commit of code to verify an x509 cert against a CA.
    
    Here is an example usage of the API:
    
    ca = assert(crypto.x509_ca())
    ca:add_pem(ca_cert)
    assert(ca:verify_pem(cert_to_verify) == true, "failed to verify good cert")
  3. tests: generate a CA and a server cert

    Brandon Philips authored
    Generate some certs to test x509 functionality.
Something went wrong with that request. Please try again.