{"_id":"ursa","_rev":"76-0a4b89bdd2552731efa17d1e076be52b","name":"ursa","description":"RSA public/private key OpenSSL bindings for node and io.js","dist-tags":{"latest":"0.9.4"},"versions":{"0.4.10":{"name":"ursa","version":"0.4.10","keywords":["crypto","key","openssl","private","public","rsa"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.4.10","dependencies":{},"devDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.0.106","_nodeVersion":"v0.6.7","_defaultsLoaded":true,"dist":{"shasum":"3824211e12120facfe099bc930b72bc46858c2a9","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.4.10.tgz","integrity":"sha512-wZmF4R4JT63bZw/eRZckrNUfNFjAYbZeP66uehP06YAogi/Ay4Y0obaJcWz7/DGeiNCCD5WhUSGz65W8QP1FHg==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEQCICPAJnUxV3ompKPg+om30GaMTYe4vOj9xwndJwcxTGgfAiA4hmKtGPCYbTYSaxt3CQEGUKnptNxJEJD/0VGGO9Oayg=="}]},"directories":{}},"0.4.11":{"name":"ursa","version":"0.4.11","keywords":["crypto","key","openssl","private","public","rsa"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.4.11","dependencies":{},"devDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.0.106","_nodeVersion":"v0.6.7","_defaultsLoaded":true,"dist":{"shasum":"c224047a6c334cbb3efc1c33fbe1d9b20fa51f2f","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.4.11.tgz","integrity":"sha512-Rv+j43RsU5GKH3oPfHS/18YL0p6GjcTXfzPUWKkNwiHwYFQ5KasyNTXqLQnCZd72z8Al//KHh4gRlJe1FRWxIw==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIHaTIebX4XfaxQPmB2hWvUdpVi3WyiHXOykrnftq8/xJAiEAk5qvwtcEnzTUCWiLiIGnU8gXPGnKUnGhWP/3ilL+EPk="}]},"directories":{}},"0.4.12":{"name":"ursa","version":"0.4.12","keywords":["crypto","key","openssl","private","public","rsa"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.4.12","dependencies":{},"devDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.0.106","_nodeVersion":"v0.6.7","_defaultsLoaded":true,"dist":{"shasum":"fbff47a8d4a3eb0462db2fee2b4f3fa3269ed768","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.4.12.tgz","integrity":"sha512-hvMvfUqCPl3QjZAg+gODgnJeTLIy3dQf8ID9/ASVxfAppWtNx39xMHOeuXPDEsWtJQ3t+4pxFMJFdwTH6My7dA==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIEV2FRyeGaoO7GuzGT2PhZhkTtpPZk9hFO0RQSWjlD2vAiEAiEaLjhWIH57UIvBBwmI4ljYQ5py85rv2Wy3NDDvkAok="}]},"directories":{}},"0.4.13":{"name":"ursa","version":"0.4.13","keywords":["crypto","key","openssl","private","public","rsa"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.4.13","dependencies":{},"devDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.0.106","_nodeVersion":"v0.6.7","_defaultsLoaded":true,"dist":{"shasum":"383e1d6c496abdbf3fd908ca7842fec683b6aff3","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.4.13.tgz","integrity":"sha512-Nm6UhcM9tUbGW48MhheZQAJx9bvDEFb9z2k3WC5k4uAZ1U4eYmoGB79U+BOv0hP3QXmM0tL+YT+N9J+9vlY2wQ==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEYCIQDk8S7BBE8dyqP465freF3zu4jeaXXmT8A185tQChTkkAIhAK1srpQNPma2B1t6dliWbUgDQrh5fcYP/8kWlvN/s382"}]},"directories":{}},"0.6.0":{"name":"ursa","version":"0.6.0","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.6.0","dependencies":{},"devDependencies":{},"optionalDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.1.1","_nodeVersion":"v0.6.11","_defaultsLoaded":true,"dist":{"shasum":"65b492bf33cc4967944e388ece3f51ad7c92dc13","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.6.0.tgz","integrity":"sha512-w1T+MC9t5A8TzBHW+Irp9iLXc/odbb5wFhjfSNx/Z/22YYABcxc9uIVgi3uui9VfIIw3uvsTPd/Cqin0c4CIyA==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIQDzHHY3zIuTBmAhlgobbfRqB3oRNGnyJMgOX74d3zoPpQIgF874lTMKsi0xpmbqHZZ9FAT14MDgofVctY3RHp+SbdY="}]},"directories":{}},"0.6.1":{"name":"ursa","version":"0.6.1","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.6.1","dependencies":{},"devDependencies":{},"optionalDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.1.1","_nodeVersion":"v0.6.11","_defaultsLoaded":true,"dist":{"shasum":"4fe5fb5d49ee490808bdd0a83b75633d9dd5cb8b","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.6.1.tgz","integrity":"sha512-4Hwfq3R8ZggDy6P8p8xhNUIBo1GhtYdt8L6iLlI/bV0KuIEjXi1JVuRV0n0bY9vdtt3H8kaFj3Q1Y6fNL/Rm8Q==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIE8nu0LPVINc8ec+LlcEzAjklOLjrTybe4g4v0EkzVC3AiEA8N/FzVvhF8BymuMRB7Wpyl+mo7DGJoC9vH4hNA+cjwc="}]},"directories":{}},"0.6.2":{"name":"ursa","version":"0.6.2","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.6.2","dependencies":{},"devDependencies":{},"optionalDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.1.1","_nodeVersion":"v0.6.11","_defaultsLoaded":true,"dist":{"shasum":"cd84e85d5c323d272484b7f61acd39e47428582b","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.6.2.tgz","integrity":"sha512-ZvmLJJLtj6pjDvDGPdVM1KUFxhTM89uSz1ymO43hGmMa5shXE3QoSFpaXlE/CihpYtNfbdOdFBp0Nskl89/Nfg==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIBTLzPtSmHKIIafOGpn+Xb26u7oLV5Iae/BpBsEP0JhDAiEAmP8zu8cZUaz4PNSDTrJQxnONSbKRXDSEM7ikE77H+po="}]},"directories":{}},"0.6.3":{"name":"ursa","version":"0.6.3","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build","test":"node test/test.js"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.6.3","dependencies":{},"devDependencies":{},"optionalDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.1.1","_nodeVersion":"v0.6.11","_defaultsLoaded":true,"dist":{"shasum":"8ffa74867a4d8598b55a0d16239641f7e76a2e52","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.6.3.tgz","integrity":"sha512-6FAtI0whzpBK7VEAKCcgk/Q1EaeSd3uLbMRBTZMBbBNrspdloZFPwQ7a9nN5VuRrnOjqNJ1olA6xBxQO5M9Pow==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIQCAaVXrIOEmxAXJT2csroj/7/CpiOl3IXMxIn4PnUVMeAIgbfl1y/z3tGXqZmq3pB7QxBwgXJiU37Hi4uW4nYl89Vw="}]},"directories":{}},"0.6.4":{"name":"ursa","version":"0.6.4","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build","test":"node test/test.js"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.6.4","dependencies":{},"devDependencies":{},"optionalDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.1.1","_nodeVersion":"v0.6.11","_defaultsLoaded":true,"dist":{"shasum":"fe4a2d0a1313d485aeca26b275798d9624a14d31","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.6.4.tgz","integrity":"sha512-4TjgyN5LuMoaiTHZ1vT/l0OWWhaQqLyiLE0lNe/C3clPmHoSiy8fy267WtAAjxH1yqT3ZSqXtesAb1AZjyP3Ig==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIHuj3To0N4cgzvmuHN8Yf5wAKqi/lNW4wFKxKZel0aLmAiEAsOVxAp1+tq6EnejHydLyIraCFEFDMmJi07ReRl8+Wkw="}]},"directories":{}},"0.6.5":{"name":"ursa","version":"0.6.5","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build","test":"node test/test.js"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.6.5","dependencies":{},"devDependencies":{},"optionalDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.1.4","_nodeVersion":"v0.6.12","_defaultsLoaded":true,"dist":{"shasum":"e70b9fdd398a19814721c1b78dbcbbcaab9b53ec","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.6.5.tgz","integrity":"sha512-oZ49FsrVnYSi4bqGqqkuQFKY/Qo0Nw9v/OHd7m1fL5b00Qx00yM0cTXT6e9FjzsDOZsU907jXBEUHhbq/H6zCQ==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEQCIF3DHwz6CZYrSwv3Cxsg9vf5d20LuPZdVHgPUrTL8Of9AiBwNwYdSmCnFimGqDywja51gka/mDudK2RasiUE7GQn0g=="}]}},"0.6.6":{"name":"ursa","version":"0.6.6","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build","test":"node test/test.js"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.6.6","dependencies":{},"devDependencies":{},"optionalDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.1.4","_nodeVersion":"v0.6.12","_defaultsLoaded":true,"dist":{"shasum":"a4220938405bb763cbe3c22befbdeea3e1201fb6","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.6.6.tgz","integrity":"sha512-4HrGu891LLldULKju7ONooYQjxCifyKQWcYPI6wKOgzZPbeZ/y9Ss+5LdJH0FiEpvUdVvgg5edaUvTqqShwulg==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIFaEki63KkSHepr5bI8o0lPTywPLXB5aDbzd6mBYdjoMAiEA5yvFINWiGRMzgEbrbqqm2j8rhOEsAU6T1S8dTWZxSgk="}]}},"0.6.7":{"name":"ursa","version":"0.6.7","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build","test":"node test/test.js"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.6.7","dependencies":{},"devDependencies":{},"optionalDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.1.4","_nodeVersion":"v0.6.12","_defaultsLoaded":true,"dist":{"shasum":"2a74aaafc17af39ff9b47285b4394d06a22657d4","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.6.7.tgz","integrity":"sha512-6OdGRWaD42Kef4HSs0VZgxhdem+IjkxDaYdvnfNYLP8OEWMO+jqciDAgFARxptYYxe84HAG8fU1v6lP1bDp6vg==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIQC6PwI67fjAVCPsawGcDW4fM1ozXSnOxhskAjqhoHH36QIgS3YVj9b1rRzy49/ycgJrnDAv/IHob/xwKK5CKV7LOSk="}]}},"0.6.8":{"name":"ursa","version":"0.6.8","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build","test":"node test/test.js"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.6.8","dependencies":{},"devDependencies":{},"optionalDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.1.4","_nodeVersion":"v0.6.12","_defaultsLoaded":true,"dist":{"shasum":"70a1604a2eadcb83561a5bbd6eb6a08af1c34e49","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.6.8.tgz","integrity":"sha512-f5gK1bo866/jh7g1s0n+GRZxuvAhNRvn9jmbR+DSrI0SNMytuNJ91upfXcB9gixDcG63/yOGfjq94kxnxqQADQ==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEQCIAU/vWIj3eFfjSJobcz4T2vVNo6SZoWHCIvvbV7q0Sj2AiAErk0ilrU1uT0rJhcCW3FuWVbrAIP793ikVW+6KFcJSA=="}]}},"0.6.9":{"name":"ursa","version":"0.6.9","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"git://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-waf configure build","test":"node test/test.js"},"_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"},"_id":"ursa@0.6.9","dependencies":{},"devDependencies":{},"optionalDependencies":{},"engines":{"node":"*"},"_engineSupported":true,"_npmVersion":"1.1.24","_nodeVersion":"v0.6.19","_defaultsLoaded":true,"dist":{"shasum":"28a12e0a8856811b1974d1e2db76bfad48d9543d","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.6.9.tgz","integrity":"sha512-+78OVkEPUarnqkV41m5NOdGJbOddlUhNb0zsicujdrzypRhf79vYlz5uoIj2TLAfa3LbRKdOC13/uHj8ZpKnFA==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEYCIQDPeMkvJ2jasCMjD2ZQYzP8tz6ZZhMsdYzLgmewOMSNAwIhAIUAOY9hvAzTsAil7r6CUCTgHwO82/zqdbQMjALLeqvq"}]}},"0.7.0":{"name":"ursa","version":"0.7.0","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"https://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-gyp configure build; mkdir -p bin; mv build/Release/*.node bin","test":"node test/test.js"},"_id":"ursa@0.7.0","dist":{"shasum":"f84c80b561792ca7c4207fd5a974a871b45962bd","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.7.0.tgz","integrity":"sha512-uszkTCD1MCVCHOZtyRF3jELSj8rXGsgGVRP1E3kIzBy+/J64wGIyv87DgqAPAbNS/b1nOBWmOEwEHD76xzCLcg==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIA0BLFKMr2fY0DXBDiJ45jwRnjI6aRCcRX8ds3l2SWWgAiEAn/cJgixoIOnT+ZV7vjCFPUqU/0YnJIxUYepqp6tyJJ0="}]},"_npmVersion":"1.1.59","_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"}},"0.8.0":{"name":"ursa","version":"0.8.0","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key crypto","homepage":"https://github.com/Obvious/ursa","repository":{"type":"git","url":"https://github.com/Obvious/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-gyp configure build && node install.js","test":"node test/test.js"},"_id":"ursa@0.8.0","dist":{"shasum":"05d69d05c9e217025e3d10231b4f7848ecc82356","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.8.0.tgz","integrity":"sha512-jWOWuolT6wXMll3h5hGAwu4UTVmeK7SFWOwBRL+b4AhZGOxJkEV3S2Ed0LvtMlf1ZKoS4casJacU03ahb9Ps7A==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCICye/vwSO6YLwB6qu5IlmMhq4zaqFXavYBDvZ6EATkSDAiEA1fxJtxmQqaBaTEBiOdfbnpe4WmYHzYU6s8R7BzrOEQk="}]},"_npmVersion":"1.1.63","_npmUser":{"name":"danfuzz","email":"danfuzz@milk.com"}},"0.8.1":{"name":"ursa","version":"0.8.1","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key OpenSSL bindings for Node.js","homepage":"https://github.com/NodePrime/ursa","repository":{"type":"git","url":"https://github.com/NodePrime/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"},{"name":"dpup","email":"dan@pupi.us"},{"name":"nicks","email":"nicholas.j.santos@gmail.com"},{"name":"azulus","email":"jeremy@obvious.com"},{"name":"quartzjer","email":"jeremie@jabber.org"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-gyp configure && node-gyp build && node install.js","test":"node test/test.js"},"gitHead":"9374ce05813710b3013ec1268d8f717da6907cb3","bugs":{"url":"https://github.com/NodePrime/ursa/issues"},"_id":"ursa@0.8.1","_shasum":"c9554433555ff7d3c8c2c3ab7e0f64d263b07b36","_from":".","_npmVersion":"1.4.28","_npmUser":{"name":"quartzjer","email":"jeremie@jabber.org"},"dist":{"shasum":"c9554433555ff7d3c8c2c3ab7e0f64d263b07b36","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.8.1.tgz","integrity":"sha512-OmgnFYJwXNpDYZOOUsZ1qJ9JBQ8lNF0LG4T4dqPiMaZTFd3slkT+kmb9XtYhxt4UEpepraEkI3ye4x74jaYPvA==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEYCIQCZGuChCuNC9RUHxLOpU2V6wbgMKp33GKXmoyym76bQrwIhAPpP0nW6xzMjK1C5xh/sQlQHRAXSr9QfPzyMEZqb/mz0"}]}},"0.8.2":{"name":"ursa","version":"0.8.2","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key OpenSSL bindings for node and io.js","homepage":"https://github.com/quartzjer/ursa","repository":{"type":"git","url":"https://github.com/quartzjer/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"},{"name":"dpup","email":"dan@pupi.us"},{"name":"nicks","email":"nicholas.j.santos@gmail.com"},{"name":"azulus","email":"jeremy@obvious.com"},{"name":"quartzjer","email":"jeremie@jabber.org"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"install":"node-gyp configure && node-gyp build && node install.js","test":"node test/test.js"},"dependencies":{"nan":"~1.6.2"},"gitHead":"1df7edc861b050dc1ef7e6e40069c7f7c45f8138","bugs":{"url":"https://github.com/quartzjer/ursa/issues"},"_id":"ursa@0.8.2","_shasum":"3e16d25006c7bf815aeea81e3c8f8da805a06e29","_from":".","_npmVersion":"1.4.28","_npmUser":{"name":"quartzjer","email":"jeremie@jabber.org"},"dist":{"shasum":"3e16d25006c7bf815aeea81e3c8f8da805a06e29","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.8.2.tgz","integrity":"sha512-62YE7zd5Ey+BBz+OAQhInDCstBWDz3L0tB+4l78POiRycKblmw5EbaTh+DXPZu81kcj2NYNRHhdcy71+WCpAlA==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEYCIQDDkTZb1pH2ki2PNK6ehi+9gdIUauKLXXtHxKsQma9IbQIhAItxHQfVWoaoxHqBrQDAdcPpbNohi1qMI7Tk778TR2nE"}]}},"0.8.3":{"name":"ursa","version":"0.8.3","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key OpenSSL bindings for node and io.js","homepage":"https://github.com/quartzjer/ursa","repository":{"type":"git","url":"https://github.com/quartzjer/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"},{"name":"dpup","email":"dan@pupi.us"},{"name":"nicks","email":"nicholas.j.santos@gmail.com"},{"name":"azulus","email":"jeremy@obvious.com"},{"name":"quartzjer","email":"jeremie@jabber.org"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"test":"node test/test.js","install":"node-gyp rebuild"},"dependencies":{"bindings":"^1.2.1","nan":"~1.6.2"},"gypfile":true,"gitHead":"de3d15ee38770cac1008acc9a3ac447892a06beb","bugs":{"url":"https://github.com/quartzjer/ursa/issues"},"_id":"ursa@0.8.3","_shasum":"c5eda0e96eba2311cb6a7fc1f6c6d63eeb795a12","_from":".","_npmVersion":"2.5.1","_nodeVersion":"1.3.0","_npmUser":{"name":"quartzjer","email":"jeremie@jabber.org"},"dist":{"shasum":"c5eda0e96eba2311cb6a7fc1f6c6d63eeb795a12","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.8.3.tgz","integrity":"sha512-jIiLV+DtiPdyE+9bSfhlvihGXd7H62PSO9VD7Ho7NytYN3p9sh82GKzNn7gPgadAxsuqzMdgEMVf3QCB+TsqCQ==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEQCIHfZgXYHGckvlIuyshGBvP5QCyDqZgxZotlNxGJOrvLEAiAHOQ0ddbc/fwyRBbXa1HAh1/BMxABb5MfS6K3A6No0fw=="}]}},"0.8.4":{"name":"ursa","version":"0.8.4","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key OpenSSL bindings for node and io.js","homepage":"https://github.com/quartzjer/ursa","repository":{"type":"git","url":"https://github.com/quartzjer/ursa.git"},"licenses":[{"type":"Apache 2.0","url":"http://www.apache.org/licenses/LICENSE-2.0.html"}],"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"},{"name":"dpup","email":"dan@pupi.us"},{"name":"nicks","email":"nicholas.j.santos@gmail.com"},{"name":"azulus","email":"jeremy@obvious.com"},{"name":"quartzjer","email":"jeremie@jabber.org"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"test":"node test/test.js","install":"node-gyp rebuild"},"dependencies":{"bindings":"^1.2.1","nan":"^1.7.0"},"gypfile":true,"gitHead":"8faf91c52b998482640cb161136fd001acfd91d3","bugs":{"url":"https://github.com/quartzjer/ursa/issues"},"_id":"ursa@0.8.4","_shasum":"c1a2859ff9162a2dc8420bf1fa9a260c2f5c1730","_from":".","_npmVersion":"2.5.1","_nodeVersion":"1.3.0","_npmUser":{"name":"quartzjer","email":"jeremie@jabber.org"},"dist":{"shasum":"c1a2859ff9162a2dc8420bf1fa9a260c2f5c1730","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.8.4.tgz","integrity":"sha512-JOHwF2DuzF2wknCjRWPrKtVmiQk/6YR/M9MTrD0+oR7+ESGgH1NVs94g4BIoh7Rgm+F1xNVm/zYQRhgJu37r5g==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEYCIQCWHiYNifXuHcEsJDf9XC8PinIf8MO5bqkSOTbH2OqmaAIhAJMkXNB8lHFqRE63FvRSCTjdJ05d+wV2xBVLV5e83e4r"}]}},"0.8.5":{"name":"ursa","version":"0.8.5","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key OpenSSL bindings for node and io.js","homepage":"https://github.com/quartzjer/ursa","repository":{"type":"git","url":"git+https://github.com/quartzjer/ursa.git"},"license":"Apache-2.0","author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"},{"name":"dpup","email":"dan@pupi.us"},{"name":"nicks","email":"nicholas.j.santos@gmail.com"},{"name":"azulus","email":"jeremy@obvious.com"},{"name":"quartzjer","email":"jeremie@jabber.org"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"test":"node test/test.js","install":"node-gyp rebuild"},"dependencies":{"bindings":"^1.2.1","nan":"^1.7.0"},"gypfile":true,"gitHead":"2b475049d5c3fdb90464f3ca42e35bf33afcec3c","bugs":{"url":"https://github.com/quartzjer/ursa/issues"},"_id":"ursa@0.8.5","_shasum":"cb6beca9808840de0c9e6057153be3b1901431b6","_from":".","_npmVersion":"2.10.1","_nodeVersion":"2.1.0","_npmUser":{"name":"quartzjer","email":"jeremie@jabber.org"},"dist":{"shasum":"cb6beca9808840de0c9e6057153be3b1901431b6","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.8.5.tgz","integrity":"sha512-Cpd7wL6ke/ithQOLqLDvw9zrlNunPyzMJeCDdTT4aHMPaWR06wK9tfpIEnK2axR9tkMRv3QbTUO5TrKCh6QUJg==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEYCIQD2sJw/htBWG0C21SJYIF5Ewx9bkfFdde9QXoyQyWLEEwIhAJptjj46Btb1/rBdtEoZBPzGIFMKTcpIBcf8GmOS7p2J"}]}},"0.9.0":{"name":"ursa","version":"0.9.0","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key OpenSSL bindings for node and io.js","homepage":"https://github.com/quartzjer/ursa","repository":{"type":"git","url":"git+https://github.com/quartzjer/ursa.git"},"license":"Apache-2.0","author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"},{"name":"dpup","email":"dan@pupi.us"},{"name":"nicks","email":"nicholas.j.santos@gmail.com"},{"name":"azulus","email":"jeremy@obvious.com"},{"name":"quartzjer","email":"jeremie@jabber.org"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"test":"node test/test.js","install":"node-gyp rebuild"},"dependencies":{"bindings":"^1.2.1","nan":"^2.0.9"},"gypfile":true,"gitHead":"fd9c8972408fd6266ce81408dd662a56c2e1b661","bugs":{"url":"https://github.com/quartzjer/ursa/issues"},"_id":"ursa@0.9.0","_shasum":"6baffdbbbc7fbf3a232fde1359a1cfc548b781ce","_from":".","_npmVersion":"2.14.4","_nodeVersion":"4.1.1","_npmUser":{"name":"quartzjer","email":"jeremie@jabber.org"},"dist":{"shasum":"6baffdbbbc7fbf3a232fde1359a1cfc548b781ce","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.9.0.tgz","integrity":"sha512-crlOLUyRfcZ2vGSt+/ya8OUQJmYrqlTYbtzZrFcsZR9JJWS2whBsmnAmyFkQbusTJ/GVfGDAlPMAyzSECBy1XA==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIQDTGsOd/4DVZGLM7B7i40ZXYUPv1mubiE6mKVBFUxwZ3QIgQfPSKSOIytqhw248XNdZWG8aQBSAax5WuWGNK3bL1aE="}]}},"0.9.1":{"name":"ursa","version":"0.9.1","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key OpenSSL bindings for node and io.js","homepage":"https://github.com/quartzjer/ursa","repository":{"type":"git","url":"git+https://github.com/quartzjer/ursa.git"},"license":"Apache-2.0","author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"},{"name":"dpup","email":"dan@pupi.us"},{"name":"nicks","email":"nicholas.j.santos@gmail.com"},{"name":"azulus","email":"jeremy@obvious.com"},{"name":"quartzjer","email":"jeremie@jabber.org"}],"main":"lib/ursa.js","engine":{"node":">=0.6.0"},"scripts":{"test":"node test/test.js","install":"node-gyp rebuild"},"dependencies":{"bindings":"^1.2.1","nan":"^2.0.9"},"gypfile":true,"gitHead":"72479ac40c5237627f4114ac9f6a11db510caf09","bugs":{"url":"https://github.com/quartzjer/ursa/issues"},"_id":"ursa@0.9.1","_shasum":"f7875a9b5f62e088970376bcc00909d6d9007f80","_from":".","_npmVersion":"2.14.4","_nodeVersion":"4.1.1","_npmUser":{"name":"quartzjer","email":"jeremie@jabber.org"},"dist":{"shasum":"f7875a9b5f62e088970376bcc00909d6d9007f80","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.9.1.tgz","integrity":"sha512-tXquxF8Nq1+bCHrJEBbvNF0o+6r2/JPkeC7Qyj789jroCN5/idPyGoBpND2dJzBLJuWr8ynhLQtcd2/QCFareA==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEQCICsMrKz1l6/7daVZ7NfVRnCJWUXdUA4xCSQkczFoAPRrAiBTOK1kGkq+ZsExVp8r8dRW5IEnmDsxcYbo7eKs34VFOA=="}]}},"0.9.2":{"name":"ursa","version":"0.9.2","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key OpenSSL bindings for node and io.js","homepage":"https://github.com/quartzjer/ursa","repository":{"type":"git","url":"https://github.com/quartzjer/ursa.git"},"license":"Apache-2.0","author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"},{"name":"dpup","email":"dan@pupi.us"},{"name":"nicks","email":"nicholas.j.santos@gmail.com"},{"name":"azulus","email":"jeremy@obvious.com"},{"name":"quartzjer","email":"jeremie@jabber.org"}],"main":"lib/ursa.js","engine":{"node":">=0.10.0"},"scripts":{"test":"node test/test.js","install":"node-gyp rebuild"},"dependencies":{"bindings":"^1.2.1","nan":"^2.0.9"},"gypfile":true,"gitHead":"540c9344c0700ef761911b691ae0ffac67b40816","bugs":{"url":"https://github.com/quartzjer/ursa/issues"},"_id":"ursa@0.9.2","_shasum":"a3fd730f781da6718b4845e9b4bae4fe5e550d82","_from":".","_npmVersion":"1.4.28","_npmUser":{"name":"quartzjer","email":"jeremie@jabber.org"},"dist":{"shasum":"a3fd730f781da6718b4845e9b4bae4fe5e550d82","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.9.2.tgz","integrity":"sha512-8TeYzjpyvmw9bBhuNNeyZafdtteBXEp+Sea4xxVltrVrg/2t/yXhRZ2QU/Mf7Nflq4fHt/VTJCqb75MeLjyjmw==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIACxKJYb5Q+U320ar0CyzwWKN3RMHdSxpAP1BLPyln5rAiEAp1NKYlDdqY0ic56oiOndfFUEGih8/4jzfgfoQAqpVVc="}]},"_npmOperationalInternal":{"host":"packages-5-east.internal.npmjs.com","tmp":"tmp/ursa-0.9.2.tgz_1456298475751_0.7727328729815781"}},"0.9.3":{"name":"ursa","version":"0.9.3","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key OpenSSL bindings for node and io.js","homepage":"https://github.com/quartzjer/ursa","repository":{"type":"git","url":"https://github.com/quartzjer/ursa.git"},"license":"Apache-2.0","author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"},{"name":"dpup","email":"dan@pupi.us"},{"name":"nicks","email":"nicholas.j.santos@gmail.com"},{"name":"azulus","email":"jeremy@obvious.com"},{"name":"quartzjer","email":"jeremie@jabber.org"}],"main":"lib/ursa.js","engines":{"node":">=0.10.0"},"scripts":{"test":"node test/test.js","install":"node-gyp rebuild"},"dependencies":{"bindings":"^1.2.1","nan":"^2.0.9"},"gypfile":true,"gitHead":"107a92b9c335553d6a33919a0513459f7954f7d3","bugs":{"url":"https://github.com/quartzjer/ursa/issues"},"_id":"ursa@0.9.3","_shasum":"25661acef51657131782ec3a009bd55562ebe74a","_from":".","_npmVersion":"1.4.28","_npmUser":{"name":"quartzjer","email":"jeremie@jabber.org"},"dist":{"shasum":"25661acef51657131782ec3a009bd55562ebe74a","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.9.3.tgz","integrity":"sha512-GuaMuAsqTV9NKJQ6BJ8XhRVScdF/ktatmx10HkDJ6uiDvi4/kK+MdM/IvnyiYfxrEUfRspiLVQa+bpmfHRRJxA==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEYCIQC4akDyVyh2w4le+dvWg0gba9fS4g7QMM7qeQPChVziFQIhAJo/LeGmFUJijtLxUW9LG95WBGfy4Dza8Y+wapkbMgaG"}]},"_npmOperationalInternal":{"host":"packages-6-west.internal.npmjs.com","tmp":"tmp/ursa-0.9.3.tgz_1456324372763_0.20360520109534264"}},"0.9.4":{"name":"ursa","version":"0.9.4","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"description":"RSA public/private key OpenSSL bindings for node and io.js","homepage":"https://github.com/quartzjer/ursa","repository":{"type":"git","url":"git+https://github.com/quartzjer/ursa.git"},"license":"Apache-2.0","author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"},{"name":"dpup","email":"dan@pupi.us"},{"name":"nicks","email":"nicholas.j.santos@gmail.com"},{"name":"azulus","email":"jeremy@obvious.com"},{"name":"quartzjer","email":"jeremie@jabber.org"}],"main":"lib/ursa.js","engines":{"node":">=0.10.0"},"scripts":{"test":"node test/test.js","install":"node-gyp rebuild"},"dependencies":{"bindings":"^1.2.1","nan":"^2.3.3"},"gypfile":true,"gitHead":"216ad542b6722c560d24555b4ea0a76051654e6c","bugs":{"url":"https://github.com/quartzjer/ursa/issues"},"_id":"ursa@0.9.4","_shasum":"0a2abfb7dc4267f733b0f8f2fc7f2c895d40a413","_from":".","_npmVersion":"3.8.6","_nodeVersion":"6.0.0","_npmUser":{"name":"quartzjer","email":"jeremie@jabber.org"},"dist":{"shasum":"0a2abfb7dc4267f733b0f8f2fc7f2c895d40a413","tarball":"https://registry.npmjs.org/ursa/-/ursa-0.9.4.tgz","integrity":"sha512-bkSIu0TDNFrpKki28yXMCKB9sbxJBd2aSalXcY4qyzGLR3zw/Ln1vcU1RyGN1fjuGLFDbZ9AWN4rcAiKVMGkpQ==","signatures":[{"keyid":"SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA","sig":"MEUCIQCg3b2kqii7m1ptNw4awuyfaXaafbuidu2fqdc0PSPvgAIgHFZXAuaryxyO9qrZsSTr6qX2JV822HplQFsGhWfqneE="}]},"_npmOperationalInternal":{"host":"packages-12-west.internal.npmjs.com","tmp":"tmp/ursa-0.9.4.tgz_1462840564075_0.891536823939532"}}},"readme":"URSA - RSA public/private key OpenSSL bindings for Node.js\n====\n\n[![Build Status](https://travis-ci.org/quartzjer/ursa.svg?branch=master)](https://travis-ci.org/quartzjer/ursa)\n\n> NOTE: This package was transfered from [Medium](https://github.com/Medium) and [NodePrime](https://github.com/NodePrime) to [quartzjer](https://github.com/quartzjer) in February 2015. Pull requests are welcomed to help maintain it.\n\n--\n\nThis Node module provides a fairly complete set of wrappers for the\nRSA public/private key crypto functionality of OpenSSL.\n\nIt is being actively developed for node.js 0.8.* through 0.12.* and io.js. If you find it doesn't work for you, please file a bug (see below).\n\nIt has been tested on Windows by [SLaks](https://github.com/SLaks). (see [additional installation requirements](#windows-install))\n\nTable of Contents\n-----------------\n- [Simple Encrypt / Decrypt Example](#simple-encrypt--decrypt-example)\n- [Building and Installing](#building-and-installing)\n- [Usage](#usage)\n- [Top-level Exports](#top-level-exports)\n- [Public Key Methods](#public-key-methods)\n- [Private Key Methods](#private-key-methods)\n- [Signer Methods](#signer-methods)\n- [Verifier Methods](#verifier-methods)\n- [Constants](#constants)\n- [Contributing](#contributing)\n- [Authors](#authors)\n- [License](#license)\n- [Related Repos](#other-repos-that-may-be-of-interest)\n\n\n\n\nSimple Encrypt / Decrypt Example\n--------------------------------\n\n```javascript\n// openssl genrsa -out certs/server/my-server.key.pem 2048\n// openssl rsa -in certs/server/my-server.key.pem -pubout -out certs/client/my-server.pub\n\n'use strict';\n\nvar fs = require('fs')\n , ursa = require('ursa')\n , crt\n , key\n , msg\n ;\n\nkey = ursa.createPrivateKey(fs.readFileSync('./certs/server/my-server.key.pem'));\ncrt = ursa.createPublicKey(fs.readFileSync('./certs/client/my-server.pub'));\n\nconsole.log('Encrypt with Public');\nmsg = crt.encrypt(\"Everything is going to be 200 OK\", 'utf8', 'base64');\nconsole.log('encrypted', msg, '\\n');\n\nconsole.log('Decrypt with Private');\nmsg = key.decrypt(msg, 'base64', 'utf8');\nconsole.log('decrypted', msg, '\\n');\n\nconsole.log('############################################');\nconsole.log('Reverse Public -> Private, Private -> Public');\nconsole.log('############################################\\n');\n\nconsole.log('Encrypt with Private (called public)');\nmsg = key.privateEncrypt(\"Everything is going to be 200 OK\", 'utf8', 'base64');\nconsole.log('encrypted', msg, '\\n');\n\nconsole.log('Decrypt with Public (called private)');\nmsg = crt.publicDecrypt(msg, 'base64', 'utf8');\nconsole.log('decrypted', msg, '\\n');\n```\n\n\nBuilding and Installing\n-----------------------\n\n```shell\nnpm install ursa\n```\n\nOr grab the source and\n\n```shell\nnpm install\n```\n\nTesting\n-------\n\n```shell\nnpm test\n```\n\nOr\n\n```shell\nnode ./test/test.js\n```\n\nOn Windows, you'll need to install some dependencies first:\n - [OpenSSL](http://slproweb.com/products/Win32OpenSSL.html) (normal, not light)\nin the same bitness as your Node.js installation.\n - OpenSSL must be installed in the a specific install directory (`C:\\OpenSSL-Win32` or `C:\\OpenSSL-Win64`)\n - If you get `Error: The specified module could not be found.`, copy `libeay32.dll` from the OpenSSL bin directory to this module's bin directory, or to Windows\\System32.\n - [node-gyp](https://github.com/nodejs/node-gyp) (`npm install -g node-gyp`)\n - You will need [python 2.7](http://www.python.org/download/releases/2.7.3#download) and a compatible version \n Visual Studio installed first. Even with that, `node-gyp` installation or use can have \n issues on Windows. The `node-gyp` [README file](https://github.com/nodejs/node-gyp) has detailed instructions \n if you have difficulties. [This post](https://www.robertkehoe.com/2015/03/fix-node-gyp-rebuild-error-on-windows/) \n is also a good reference.\n\nUsage\n-----\n\nThis library aims to be convenient to use, allowing one to pass in and\nget back regular string objects. However, it is also meant to be reasonably\neasy to use efficiently, allowing one to pass in and get back Buffer\nobjects. Using Buffers is always the more efficient option.\n\nAll methods that can deal with strings take one or more arguments indicating\nthe encoding to use when interpreting an argument or generating a result.\nThese are limited to the usual encoding names that are valid for use with\nBuffers: `base64` `binary` `hex` and `utf8`. If an encoding is left undefined\nand the argument is a string, then the encoding is *always* assumed to be\n`utf8`. If an argument is a Buffer, then the encoding (if defined at all)\nis ignored. An undefined output encoding is *always* interpreted as a request\nfor a Buffer result.\n\nThe library knows how to read and output PEM format files for both\npublic and private keys, and it can generate new private keys (aka\nkeypairs).\n\nThe usual public-encryption / private-decryption operations by default\nuse padding mode `RSA_PKCS1_OAEP_PADDING`, which is the recommended\nmode for all new applications (as of this writing). Note that this mode\nbuilds-in a random element into every encryption operation, making it\nunnecessary to waste time or effort adding randomness in at a higher layer.\nThis default may be overridden to use the older mode `RSA_PKCS1_PADDING`\nif needed.\n\nThe less well-understood private-encryption / public-decryption operations\n(used for building signature mechanisms) by default use padding\nmode `RSA_PKCS1_PADDING`. This doesn't build in any randomness (but that's\nnot usually a problem for applications that use these operations). This \ndefault may be overridden to use `RSA_NO_PADDING` if needed.\n\nSee the doc comments and tests for the excruciating details, but here's\na quick rundown of the available top-level exports and instance methods:\n\nTop-Level Exports\n-----------------\n\n### ursa.createPrivateKey(pem, password, encoding)\n\nCreate and return a private key (aka a keypair) read in from the given\nPEM-format file. If defined, the given password is used to decrypt\nthe PEM file.\n\nThe encoding, if specified, applies to both other arguments.\n\nSee \"Public Key Methods\" below for more details.\n\n### ursa.createPrivateKeyFromComponents(modulus, exponent, p, q, dp, dq, inverseQ, d)\n\nCreate and return a private key from the given components.\n\n### ursa.createPublicKeyFromComponents(modulus, exponent)\n\nCreate and return a public key from the given components.\n\n### ursa.assertKey(obj)\n\nConvenient shorthand for `assert(ursa.isKey(obj))`.\n\n### ursa.assertPrivateKey(obj)\n\nConvenient shorthand for `assert(ursa.isPrivateKey(obj))`.\n\n### ursa.assertPublicKey(obj)\n\nConvenient shorthand for `assert(ursa.isPublicKey(obj))`.\n\n### ursa.coerceKey(orig)\n\nCoerce the given key value into a key object (either public or\nprivate), returning it. If given a private key object, this just\nreturns it as-is. If given a string or Buffer, it tries to parse it as\nPEM. Anything else will result in an error.\n\n### ursa.coercePrivateKey(orig)\n\nCoerce the given key value into a private key object, returning it. If\ngiven a private key object, this just returns it as-is. If given a\nstring or Buffer, it tries to parse it as PEM. Anything else will\nresult in an error.\n\n### ursa.coercePublicKey(orig)\n\nCoerce the given key value into a public key object, returning it. If\ngiven a private key object, this just returns it as-is. If given a\nstring or Buffer, it tries to parse it as PEM. Anything else will\nresult in an error.\n\n### ursa.createPublicKey(pem, encoding)\n\nCreate and return a public key read in from the given PEM-format file.\nSee \"Public Key Methods\" below for more details.\n\n### ursa.createSigner(algorithm)\n\nCreate and return a signer which can sign a hash generated with the named\nalgorithm (such as `\"sha256\"` or `\"md5\"`). See \"Signer Methods\" below\nfor more details.\n\nThis function is similar to `crypto.createSign()`, except this function\ntakes a hash algorithm name (e.g., `\"sha256\"`) and not a crypto+hash name\ncombination (e.g., `\"RSA-SHA256\"`).\n\n### ursa.createVerifier(algorithm)\n\nCreate and return a verifier which can verify a hash generated with the\nnamed algorithm (such as `\"sha256\"` or `\"md5\"`). See \"Verifier Methods\" below\nfor more details.\n\nThis function is similar to `crypto.createVerify()`, except this function\ntakes a hash algorithm name (e.g., `\"sha256\"`) and not a crypto+hash name\ncombination (e.g., `\"RSA-SHA256\"`).\n\n### ursa.equalKeys(key1, key2)\n\nThis returns `true` if and only if both arguments are key objects of\nthe same type (public or private) and their contents match.\n\n### ursa.generatePrivateKey(modulusBits, exponent)\n\nCreate and return a freshly-generated private key (aka a keypair).\nThe first argument indicates the number of bits in the modulus (1024\nor more is generally considered secure). The second argument indicates\nthe exponent value, which must be odd (65537 is the typical value; 3\nand 17 are also common). Both arguments are optional and default to\n2048 and 65537 (respectively).\n\nThis method will throw if `modulusBits` is less than `512` (because\nit's pretty crazy to want a key with that few bits) or if `exponent`\nis even (because RSA only works for odd exponents).\n\nUsing the command-line `openssl` tool, this operation is\nequivalent to:\n\n```shell\nopenssl genrsa -out key-name.pem \n```\n\nfor exponent 65537, or for exponent 3 with the additional option\n`-3`. (That tool doesn't support other exponents.)\n\n### ursa.isKey(obj)\n\nReturn `true` if the given object is a key object (public or private) that\nwas created by this module. Return `false` if not.\n\n### ursa.isPrivateKey(obj)\n\nReturn `true` if the given object is a private key object that\nwas created by this module. Return `false` if not.\n\n### ursa.isPublicKey(obj)\n\nReturn `true` if the given object is a public key object that\nwas created by this module. Return `false` if not.\n\nNote that, even though all the public key operations work on private\nkeys, this function only returns true if the given object is a\npublic key, per se.\n\n### ursa.matchingPublicKeys(key1, key2)\n\nThis returns `true` if and only if both arguments are key objects of\nsome sort (either can be public or private, and they don't have to\nbe the same) and their public aspects match each other.\n\n### ursa.openSshPublicKey(key, encoding)\n\nThis returns `publicKey` from ssh-rsa public key-string. First argument\nmust be a string like `ssh-rsa AAAAB3Nz.... user@localhost` or Buffer of pubKey bits.\n\n### ursa.sshFingerprint(sshKey, sshEncoding, outEncoding)\n\nReturn the SSH-style public key fingerprint of the given SSH-format\npublic key (which was, perhaps, the result of a call to\n`toPublicSsh()` on a key object).\n\nThis is no more and no less than an MD5 hash of the given SSH-format\npublic key. This function doesn't actually check to see if the given\nkey is valid (garbage in, garbage out).\n\nUsing the command-line `ssh-keygen` tool, this operation is\nequivalent to:\n\n```shell\nssh-keygen -l -f key-name.sshpub\n```\n\nThis operation is also equivalent to this:\n\n```shell\ncat key-name.sshpub | awk '{print $2}' | base64 --decode | md5\n```\n\nPublic Key Methods\n------------------\n\nThese are all the methods available on public keys. These methods are\n*also* available on private keys (since private keys have all the\nunderlying data necessary to perform the public-side operations).\n\n### encrypt(buf, bufEncoding, outEncoding, padding)\n\nThis performs the \"public encrypt\" operation on the given buffer. The\nresult is always a byte sequence that is the same size as the key\nassociated with the instance. (For example, if the key is 2048 bits,\nthen the result of this operation will be 2048 bits, aka 256 bytes.)\n\nThe input buffer is limited to be no larger than the key size\nminus 41 bytes.\n\nIf no padding mode is specified, the default, and recommended, mode\nis `ursa.RSA_PKCS1_OAEP_PADDING`. The mode\n`ursa.RSA_PKCS1_PADDING` is also supported.\n\n### getExponent(encoding)\n\nGet the public exponent as an unsigned big-endian byte sequence.\n\n### getModulus(encoding)\n\nGet the public modulus as an unsigned big-endian byte sequence.\n\n### hashAndVerify(algorithm, buf, sig, encoding, use\\_pss\\_padding, salt\\_len)\n\nThis is a friendly wrapper for verifying signatures. The given buffer\nis hashed using the named algorithm, and the result is verified\nagainst the given signature. This returns `true` if the hash and\nsignature match and the signature was produced by the appropriate\nprivate key. This returns `false` if the signature is a valid signature\n(structurally) but doesn't match. This throws an exception in other\ncases.\n\nThe encoding, if specified, applies to both buffer-like arguments. The\nalgorithm must always be a string.\n\nIf `use_pss_padding` is truthy then [RSASSA-PSS](http://tools.ietf.org/html/rfc3447#section-8.1)\npadding is used when verifying the signature. `salt_len`, if specified, is\nthe length of the PSS salt (in bytes) or one of the following:\n\n- `RSA_PKCS1_SALT_LEN_HLEN` (the same as the hash length, default).\n- `RSA_PKCS1_SALT_LEN_MAX` (maximum permissable value).\n\n### publicDecrypt(buf, bufEncoding, outEncoding)\n\nThis performs the \"public decrypt\" operation on the given buffer. The\nresult is always a byte sequence that is no more than the size of the\nkey associated with the instance. (For example, if the key is 2048\nbits, then the result of this operation will be no more than 2048\nbits, aka 256 bytes.)\n\nIf no padding mode is specified, the default, and recommended, mode\nis `ursa.RSA_PKCS1_PADDING`. The mode `ursa.RSA_NO_PADDING` is also supported.\n\n### toPublicPem(encoding)\n\nThis converts the public key data into a PEM-format file.\n\n### toPublicSsh(encoding)\n\nThis converts the public key data into an SSH-format file. This is the\nfile format one finds in SSH's `authorized_keys` and `known_hosts` files.\nWhen used in such files, the contents are base64-encoded and prefixed with\nthe label `ssh-rsa`. Depending on context, the line a key appears on may\nalso have a host name prefix (in `known_hosts`) or comment suffix\n(in `authorized_keys`).\n\nUsing the command-line `ssh-keygen` tool, this operation is equivalent to:\n\n```shell\nssh-keygen -y -f key-name.pem > key-name.sshpub\n```\n\n### toPublicSshFingerprint(encoding)\n\nReturn the SSH-style public key fingerprint of this key. See\n`ursa.sshFingerprint()`, above, for more details.\n\n### verify(algorithm, hash, sig, encoding)\n\nThis performs an RSA public-verify on the given hash buffer, which\nshould be the result of performing the hash operation named by\nthe algorithm (such as `\"sha256\"` or `\"md5\"`) on some data. The\nsignature buffer is checked to see if it contains a private-signed\nstatement of the algorithm and hash. The method returns `true` if\nthe signature and hash match, or `false` if the signature and hash\ndon't match but the signature is at least a valid signature of\nsome sort. In any other situation, this throws an exception.\n\nThe encoding, if specified, applies to both buffer-like arguments. The\nalgorithm must always be a string.\n\nThis method is the underlying one used as part of the implementation\nof the higher-level and much friendlier `ursa.createVerifier()` and\n`hashAndVerify()`.\n\n### ununseal(ununsealer)\n\nThis is an internal method that is used in the implementation of\n`ursa.isKey()` `ursa.isPrivateKey()` `ursa.isPublicKey()` and\nassociated assertion functions. When called externally, it will\nalways return `undefined`.\n\nPrivate Key Methods\n-------------------\n\nThese are the methods available on private keys, above and beyond\nwhat is available for public keys.\n\n### decrypt(buf, bufEncoding, outEncoding, padding)\n\nThis performs the \"private decrypt\" operation on the given buffer. The\nresult is always a byte sequence that is no more than the size of the\nkey associated with the instance. (For example, if the key is 2048\nbits, then the result of this operation will be no more than 2048\nbits, aka 256 bytes.)\n\nIf no padding mode is specified, the default, and recommended, mode\nis `ursa.RSA_PKCS1_OAEP_PADDING`. The mode\n`ursa.RSA_PKCS1_PADDING` is also supported.\n\n### getPrivateExponent(encoding)\n\nGet the private exponent as an unsigned big-endian byte sequence. The returned\nexponent is not encrypted in any way, so this method should be used with caution. \n\n### hashAndSign(algorithm, buf, bufEncoding, outEncoding, use\\_pss\\_padding, salt\\_len)\n\nThis is a friendly wrapper for producing signatures. The given buffer\nis hashed using the named algorithm, and the result is signed using\nthe private key held by this instance. The return value of this method\nis the signature.\n\nIf `use_pss_padding` is truthy then [RSASSA-PSS](http://tools.ietf.org/html/rfc3447#section-8.1)\npadding is used when generating the signature. The `salt_len`, if specified, is\nthe length of the PSS salt (in bytes) or one of the following:\n\n- `RSA_PKCS1_SALT_LEN_HLEN` (the same as the hash length, default).\n- `RSA_PKCS1_SALT_LEN_RECOVER` (assume `RSA_PKCS1_SALT_LEN_MAX` was used when the padding was added).\n\n### privateEncrypt(buf, bufEncoding, outEncoding)\n\nThis performs the \"private encrypt\" operation on the given buffer. The\nresult is always a byte sequence that is the same size as the key\nassociated with the instance. (For example, if the key is 2048 bits,\nthen the result of this operation will be 2048 bits, aka 256 bytes.)\n\nThe input buffer is limited to be no larger than the key size\nminus 12 bytes.\n\nIf no padding mode is specified, the default, and recommended, mode\nis `ursa.RSA_PKCS1_PADDING`. The mode `ursa.RSA_NO_PADDING` is also supported.\n\n### sign(algorithm, hash, hashEncoding, outEncoding)\n\nThis performs an RSA private-sign on the given hash buffer, which\nshould be the result of performing the hash operation named by\nthe algorithm (such as `\"sha256\"` or `\"md5\"`) on some data. The\nresult of this operation may later be passed to `verify()` on the\ncorresponding public key.\n\nThis method is the underlying one used as part of the implementation\nof the higher-level and much friendlier `ursa.createSigner()` and\n`hashAndSign()`.\n\n### toPrivatePem(encoding)\n\nThis converts the private key data into a PEM-format file. The result\nis not encrypted, so it behooves the user of this method to take care\nwith the result if the key is sensitive from a security standpoint,\nwhich is often the case with such things. (YMMV of course.)\n\n\nSigner Methods\n--------------\n\nThese are the methods available on signer objects, which are returned\nby `ursa.createSigner()`. These are similar to the objects returned\nfrom `crypto.createSign()`.\n\n### update(buf, bufEncoding)\n\nUpdate the hash in-progress with the given data.\n\n### sign(privateKey, outEncoding)\n\nGet the final hash of the data, and sign it using the private key. The\nreturn value is the signature, suitable for later verification.\n\n\nVerifier Methods\n----------------\n\nThese are the methods available on verifier objects, which are returned\nby `ursa.createVerifier()`. These are similar to the objects returned\nfrom `crypto.createVerify()`.\n\n### update(buf, bufEncoding)\n\nUpdate the hash in-progress with the given data.\n\n### verify(publicKey, sig, sigEncoding)\n\nGet the final hash of the data, and verify that the given signature\nboth matches it and was produced by the private key corresponding to\nthe given public key.\n\nThis returns `true` if the signature and hash match appropriately,\nor `false` if the signature appears to be generally valid (e.g.\nstructurally) yet doesn't match. This throws an exception in all\nother cases.\n\n\nConstants\n---------\n\nAllowed padding modes for public/private encryption/decryption:\n\n* `ursa.RSA_PKCS1_PADDING`\n* `ursa.RSA_NO_PADDING`\n* `ursa.RSA_PKCS1_OAEP_PADDING`\n\n\nContributing\n------------\n\nQuestions, comments, bug reports, and pull requests are all welcome.\nSubmit them at [the project on GitHub](https://github.com/quartzjer/ursa/).\n\nBug reports that include steps-to-reproduce (including code) are the\nbest. Even better, make them in the form of pull requests that update\nthe test suite. Thanks!\n\n\nAuthors\n-------\n\nCurrent (2015+) maintenance by [Jeremie Miller](https://github.com/quartzjer).\n\nPrevious (2014) maintenance sponsored by [NodePrime](http://nodeprime.com).\n\nOriginal Author (2012): [Dan Bornstein](https://github.com/danfuzz)\n([personal website](http://www.milk.com/)), supported by\n[The Obvious Corporation](http://obvious.com/) (now [Medium](https://medium.com/)).\n\nWith contribution from:\n\n* [C J Silverio](https://github.com/ceejbot)\n* [Tyler Neylon](https://github.com/tylerneylon)\n\nWith thanks to:\n\n* [node-rsa](https://github.com/chrisa/node-rsa) by Chris Andrews,\n for inspiration\n\n\nLicense\n-------\n\nUpdates Copyright 2014 [NodePrime, Inc.](http://nodeprime.com/).\nOriginal Copyright 2012 [The Obvious Corporation](http://obvious.com/).\n\nLicensed under the Apache License, Version 2.0.\nSee the top-level file `[LICENSE.txt](LICENSE.txt)` and\n(http://www.apache.org/licenses/LICENSE-2.0).\n\nOther Repos that may be of Interest:\n-----------------------\n\n* https://github.com/mal/forsake\n* https://github.com/rzcoder/node-rsa\n* https://github.com/coolaj86/nodejs-self-signed-certificate-example\n* https://github.com/coolaj86/node-ssl-root-cas/wiki/Painless-Self-Signed-Certificates-in-node.js\n* https://github.com/coolaj86/node-ssl-root-cas\n* https://github.com/coolaj86/nodejs-ssl-trusted-peer-example\n* https://github.com/coolaj86/bitcrypt\n","maintainers":[{"name":"danfuzz","email":"danfuzz@milk.com"},{"name":"dpup","email":"dan@pupi.us"},{"name":"nicks","email":"nicholas.j.santos@gmail.com"},{"name":"azulus","email":"jeremy@obvious.com"},{"name":"quartzjer","email":"jeremie@jabber.org"}],"time":{"modified":"2022-06-28T06:33:01.671Z","created":"2012-02-10T17:33:37.370Z","0.4.10":"2012-02-10T17:33:38.604Z","0.4.11":"2012-02-11T03:45:44.724Z","0.4.12":"2012-02-11T03:51:46.198Z","0.4.13":"2012-02-17T21:31:03.468Z","0.6.0":"2012-02-24T20:31:55.145Z","0.6.1":"2012-02-24T22:21:48.269Z","0.6.2":"2012-02-28T00:48:20.422Z","0.6.3":"2012-02-29T17:24:02.686Z","0.6.4":"2012-03-01T23:03:34.875Z","0.6.5":"2012-03-09T17:26:15.900Z","0.6.6":"2012-03-09T21:23:47.644Z","0.6.7":"2012-03-30T01:47:49.939Z","0.6.8":"2012-04-04T17:51:04.990Z","0.6.9":"2012-08-23T17:11:00.823Z","0.7.0":"2012-09-04T17:21:27.485Z","0.8.0":"2012-12-20T23:33:25.830Z","0.8.1":"2014-12-04T23:31:21.055Z","0.8.2":"2015-02-13T15:11:00.253Z","0.8.3":"2015-02-26T00:19:22.227Z","0.8.4":"2015-03-22T14:17:22.771Z","0.8.5":"2015-05-24T14:02:19.735Z","0.9.0":"2015-10-05T15:56:16.158Z","0.9.1":"2015-10-09T13:42:15.020Z","0.9.2":"2016-02-24T07:21:16.803Z","0.9.3":"2016-02-24T14:32:55.872Z","0.9.4":"2016-05-10T00:36:06.829Z"},"repository":{"type":"git","url":"git+https://github.com/quartzjer/ursa.git"},"author":{"name":"Dan Bornstein","email":"danfuzz@milk.com","url":"http://www.milk.com/"},"users":{"jurgis":true,"softwind":true,"vwal":true,"qodefox":true,"vvinder":true,"mrlannigan":true,"ackhub":true,"rochejul":true,"itotallyrock":true,"jidan70":true,"ethan_":true,"asaupup":true,"morogasper":true,"nuwaio":true,"ezodude":true,"mmis1000":true,"arefm":true},"homepage":"https://github.com/quartzjer/ursa","keywords":["crypto","key","openssl","private","public","rsa","sign","signature","verify","verification","hash","digest"],"readmeFilename":"README.md","bugs":{"url":"https://github.com/quartzjer/ursa/issues"},"license":"Apache-2.0"}