Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Commits on Feb 22, 2015
  1. @davedoesdev
Commits on Feb 21, 2015
  1. @davedoesdev

    Merge remote-tracking branch 'upstream/master' into 0.12

    davedoesdev authored
    Conflicts:
    	lib/ursa.js
    	src/ursaNative.cc
    	src/ursaNative.h
Commits on Feb 13, 2015
  1. @mbullington

    More NAN fixes.

    mbullington authored
  2. @mbullington

    Fix to work with NAN.

    mbullington authored
  3. @mbullington

    Merge github.com:quartzjer/ursa

    mbullington authored
    Conflicts:
    	src/ursaNative.cc
    	src/ursaNative.h
Commits on Feb 7, 2015
  1. @ceejbot
  2. @ceejbot

    Bumped nan to 1.6.2. Completed the port, mostly by restoring

    ceejbot authored
    all the defensive programming & missing argument checks.
    
    All tests pass.
Commits on Feb 5, 2015
  1. @ceejbot

    Migrated ursa to use NAN macros to hide away V8 api changes.

    ceejbot authored
    There is one compilation error remaining, with node::Encode,
    that looks to be deep inside nan.h so ... wut.
Commits on Feb 4, 2015
  1. @ceejbot
Commits on Feb 1, 2015
  1. @mbullington

    Added PrivateKey.getPrivateExponent().

    mbullington authored
    Implemented PrivateKey.getPrivateExponent() with respective doc changes and tests. This can be considered a 'dangerous' method, like toPrivatePem().
Commits on Dec 5, 2014
  1. Merge pull request #48 from mmacaulay/master

    authored
    Support for encrypted private key PEMs
  2. Merge pull request #54 from asynchrony/create_key_by_components

    authored
    Create key by components
Commits on Dec 4, 2014
Commits on Jun 6, 2014
  1. added error checking

    matt.todd authored
  2. created api to enable the creation of a private key given the individ…

    matt.todd authored
    …ual componenets of a private key
Commits on Apr 15, 2014
  1. @leeyeh
Commits on Apr 6, 2014
  1. @mmacaulay
Commits on Apr 5, 2014
  1. @mmacaulay
Commits on Oct 31, 2013
  1. @13W
Commits on Aug 28, 2013
  1. @davedoesdev

    Don't try to interpret RSA errors - always throw exception.

    davedoesdev authored
    Since public decrypt throws exceptions anyway, now verify is consistent -
    changes the API - verify functions never return false, they always throw an
    exception on fail
Commits on Aug 27, 2013
  1. @davedoesdev

    Test for more error codes which can result from bad sig (as opposed t…

    davedoesdev authored
    …o lib failure or malloc error)
  2. @davedoesdev

    Catch more PKCS1 errors

    davedoesdev authored
  3. @davedoesdev
Commits on Jul 17, 2013
  1. @davedoesdev
Commits on Feb 17, 2013
  1. @davedoesdev
Commits on Feb 10, 2013
  1. @krisb
Commits on Feb 9, 2013
  1. @krisb

    fixed export of RSA_NO_PADDING

    krisb authored
  2. @krisb
Commits on Dec 20, 2012
  1. Add missing `return`.

    Dan Bornstein authored
    Thanks to SLaks for the catch.
  2. @SLaks

    Separate asprintf.h

    SLaks authored
  3. @SLaks

    Fix non-Windows support

    SLaks authored
  4. @SLaks

    Fix OpenSSL initialization

    SLaks authored
Commits on Dec 19, 2012
  1. @SLaks

    Fix Visual C++ compilation errors

    SLaks authored
    Include asprintf if necessary
    Use _alloca() instead of non-standard dynamic arrays
Commits on Aug 30, 2012
  1. Handle both variants of key generation.

    Dan Bornstein authored
    This keys off of the OpenSSL version number, which seems to be the most
    reliable way to know whether it's safe to use the newer function.
Something went wrong with that request. Please try again.