Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Native Possible? #3

Closed
konsumer opened this issue May 17, 2013 · 3 comments
Closed

Native Possible? #3

konsumer opened this issue May 17, 2013 · 3 comments

Comments

@konsumer
Copy link

I am unsure of how to go about it, but I think it would be neat if pem used crypto native functions, instead of openssl command-line stuff, especially for Windows or really bare cloud machine deployments. Do you think this is possible?

@andris9
Copy link
Collaborator

andris9 commented May 17, 2013

Node crypto is not much of a help in this case as it does not have appropriate functions, otherwise pem module wouldn't be even needed. It would be possible to create a C binding to openssl module and create the keys directly in node without spawning a command line process but I'm not really comfortable with the C stuff. I didn't want to solve the key generation issue this way but I didn't find anything simpler or quicker to implement, so I guess the module is going to stay as it is.

@andris9 andris9 closed this as completed May 17, 2013
@konsumer
Copy link
Author

I am working on a ursa-based native version. Will update if I make progress.

@konsumer konsumer mentioned this issue May 17, 2013
@konsumer
Copy link
Author

I am a bit stuck due to my lack of knowledge about TLS/SSL, I think. This is what I have. createPrivateKey() works. I am really not too sure if createCSR() is doing what it is supposed to be. Maybe dcrypt would be a good candidate for low-level stuff, instead of ursa, as it has x509.createCert() & x509.signCert()

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants