Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix rsa openssl mismatch #15

Merged
merged 4 commits into from Mar 20, 2012
Merged

Commits on Mar 14, 2012

  1. x509_cert: add x509_cert to read out pubkey

    With this patch we can now do things like verify a x509 cert against a x509_ca
    then extract its pubkey and test a message signature.
    
        cert = crypto.x509_cert()
        cert:from_pem(server_cert)
        kpub = cert:pubkey()
        message = 'Hello world'
        verified = crypto.verify('md5', message, signature, kpub)
    Brandon Philips committed Mar 14, 2012
    Copy the full SHA
    f1b6e55 View commit details
    Browse the repository at this point in the history
  2. docs: add x509_cert and x509_ca

    add docs for the x509_cert and x509_ca objects.
    Brandon Philips committed Mar 14, 2012
    Copy the full SHA
    0c89a46 View commit details
    Browse the repository at this point in the history

Commits on Mar 20, 2012

  1. pkey: use DSA and RSA PrivateKey functions in to_pem

    Detect what type of key we are dealing with and use the right to_pem
    function. This way we match the enconding that the openssl dsa|rsa apps
    use for certificates.
    Brandon Philips committed Mar 20, 2012
    Copy the full SHA
    be18148 View commit details
    Browse the repository at this point in the history
  2. pkey: to_pem: check return codes

    check the return codes of wrote_bio_PrivateKey for any error.
    Brandon Philips committed Mar 20, 2012
    Copy the full SHA
    90539d7 View commit details
    Browse the repository at this point in the history