Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mail.netbsd.org", Issuer "Postmaster NetBSD.org" (verified OK)) by mollari.NetBSD.org (Postfix) with ESMTPS id 9F323A5802 for ; Mon, 7 Apr 2014 20:14:52 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id 17F1014A1F8; Mon, 7 Apr 2014 20:14:52 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 4D2A614A1EE for ; Mon, 7 Apr 2014 20:14:49 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id noQI_1Ed3WrG for ; Mon, 7 Apr 2014 20:14:48 +0000 (UTC) Received: from cvs.netbsd.org (cvs.NetBSD.org [IPv6:2001:4f8:3:7:2e0:81ff:fe30:95bd]) by mail.netbsd.org (Postfix) with ESMTP id 8617314A1EA for ; Mon, 7 Apr 2014 20:14:48 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id 80AEF96; Mon, 7 Apr 2014 20:14:48 +0000 (UTC) Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" MIME-Version: 1.0 Date: Mon, 7 Apr 2014 20:14:48 +0000 From: "Filip Hajny" Subject: CVS commit: pkgsrc/security/lua-sec To: pkgsrc-changes@NetBSD.org Reply-To: fhajny@netbsd.org X-Mailer: log_accum Message-Id: <20140407201448.80AEF96@cvs.netbsd.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: fhajny Date: Mon Apr 7 20:14:48 UTC 2014 Modified Files: pkgsrc/security/lua-sec: Makefile distinfo pkgsrc/security/lua-sec/patches: patch-aa patch-ab Log Message: Update lua-sec to 0.5. * A new certificate (X509) API, which supports: - Reading the subject (identity) and issuer of the certificate. - Reading various X509 extensions, including email and dnsName. - Converting certificates to and from the standard ASCII PEM format. - Generating the fingerprint/digest of a certificate (using SHA1, SHA256 or SHA512). - Reading the certificate's expiration, serial number, and other info. * The ability to get more detailed information from OpenSSL about why a certificate failed verification, for each certificate in the chain. * Flags to force acceptance of invalid certificates, e.g. to allow the use of self-signed certificates in a Trust On First Use model. * Flags to control checking CRLs for certificate revocation status. * Support for ECDH cipher suites. * An API to get the TLS 'finished' messages used for SASL channel binding (e.g. the SCRAM PLUS mechanisms). To generate a diff of this commit: cvs rdiff -u -r1.8 -r1.9 pkgsrc/security/lua-sec/Makefile cvs rdiff -u -r1.4 -r1.5 pkgsrc/security/lua-sec/distinfo cvs rdiff -u -r1.3 -r1.4 pkgsrc/security/lua-sec/patches/patch-aa cvs rdiff -u -r1.2 -r1.3 pkgsrc/security/lua-sec/patches/patch-ab Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.