forked from pool/coolkey
Accepting request 512375 from home:jengelh:branches:security:chipcard
- Remove vision statement and development methods from description. OBS-URL: https://build.opensuse.org/request/show/512375 OBS-URL: https://build.opensuse.org/package/show/security:chipcard/coolkey?expand=0&rev=19
This commit is contained in:
parent
3042ae222b
commit
145e237c68
@ -1,3 +1,8 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Jul 24 23:02:16 UTC 2017 - jengelh@inai.de
|
||||||
|
|
||||||
|
- Remove vision statement and development methods from description.
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Jul 21 14:00:08 CEST 2017 - sbrabec@suse.com
|
Fri Jul 21 14:00:08 CEST 2017 - sbrabec@suse.com
|
||||||
|
|
||||||
|
16
coolkey.spec
16
coolkey.spec
@ -79,12 +79,8 @@ keys are automatically provisioned with certificates, keys, and a PIN,
|
|||||||
unique for that user by the Red Hat Certificate System. Once the
|
unique for that user by the Red Hat Certificate System. Once the
|
||||||
CoolKey is provisioned, the user can take the key to any system and use
|
CoolKey is provisioned, the user can take the key to any system and use
|
||||||
it to login (authenticate), send and receive signed and encrypted
|
it to login (authenticate), send and receive signed and encrypted
|
||||||
email, or participate in secure messaging or IRC communication. Using a
|
email, or participate in secure messaging or IRC communication.
|
||||||
CoolKey should be as easy as starting a car. To accomplish that vision,
|
CoolKeys are based on JavaCard 1.2.
|
||||||
we are focusing on building complete support for CoolKey on exactly one
|
|
||||||
token. As the system is built out, we can add token support. CoolKeys
|
|
||||||
are based on JavaCard 1.2. We are testing with Axalto Egate Cyberflex
|
|
||||||
cards, which are available in both smart card and USB Fob form factors.
|
|
||||||
|
|
||||||
%package devel
|
%package devel
|
||||||
Summary: CoolKey and CAC PKCS #11 PKI Module for Smart Cards
|
Summary: CoolKey and CAC PKCS #11 PKI Module for Smart Cards
|
||||||
@ -103,13 +99,9 @@ keys, and a PIN unique to that user by the Red Hat Certificate System.
|
|||||||
Once the CoolKey is provisioned, the user can take the key to any
|
Once the CoolKey is provisioned, the user can take the key to any
|
||||||
system and use it to login (authenticate), send and receive signed and
|
system and use it to login (authenticate), send and receive signed and
|
||||||
encrypted email, or participate in secure messaging or IRC
|
encrypted email, or participate in secure messaging or IRC
|
||||||
communication. Using a CoolKey should be as easy as starting a car.
|
communication.
|
||||||
|
|
||||||
To accomplish that vision we are focusing on building complete support
|
CoolKeys are based on JavaCard 1.2.
|
||||||
for CoolKey on exactly one token. As the system is built out, we can
|
|
||||||
add token support. CoolKeys are based on JavaCard 1.2. We are testing
|
|
||||||
with Axalto Egate Cyberflex cards, which are available in both smart
|
|
||||||
card and USB Fob form factors.
|
|
||||||
|
|
||||||
%prep
|
%prep
|
||||||
%setup -q
|
%setup -q
|
||||||
|
Loading…
x
Reference in New Issue
Block a user