Subject: CVS commit: pkgsrc/security/lua-sec
From: Filip Hajny
Date: 2014-04-07 22:14:48
Message id: 20140407201448.80AEF96@cvs.netbsd.org

Log Message:
Update lua-sec to 0.5.

 * A new certificate (X509) API, which supports:
   - Reading  the subject  (identity) and  issuer of the certificate.
   - Reading  various X509  extensions, including email  and dnsName.
   - Converting  certificates  to and  from  the  standard ASCII  PEM
     format.
   - Generating the fingerprint/digest of a certificate  (using SHA1,
     SHA256 or SHA512).
   - Reading the  certificate's expiration, serial number,  and other
     info.
 * The ability  to get more  detailed information from  OpenSSL about
   why a certificate failed verification, for each certificate in the
   chain.
 * Flags to  force acceptance of invalid certificates,  e.g. to allow
   the use of self-signed certificates in a Trust On First Use model.
 * Flags to control checking CRLs for certificate revocation status.
 * Support for ECDH cipher suites.
 * An API  to get the TLS  'finished' messages used  for SASL channel
   binding (e.g. the SCRAM PLUS mechanisms).

Files:
RevisionActionfile
1.9modifypkgsrc/security/lua-sec/Makefile
1.5modifypkgsrc/security/lua-sec/distinfo
1.4modifypkgsrc/security/lua-sec/patches/patch-aa
1.3modifypkgsrc/security/lua-sec/patches/patch-ab