SHA256
1
0
forked from pool/pam_pkcs11

Accepting request 528838 from security:chipcard

1

OBS-URL: https://build.opensuse.org/request/show/528838
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/pam_pkcs11?expand=0&rev=29
This commit is contained in:
Dominique Leuenberger 2017-09-27 14:55:13 +00:00 committed by Git OBS Bridge
commit a4db9497c4
2 changed files with 12 additions and 18 deletions

View File

@ -1,3 +1,10 @@
-------------------------------------------------------------------
Sun Sep 10 00:08:17 UTC 2017 - jengelh@inai.de
- Repair bulletpoint that skidded in description.
Trim description of %name-devel-doc, it does not cotain
the programs.
-------------------------------------------------------------------
Wed Aug 9 15:08:07 UTC 2017 - astieger@suse.com

View File

@ -59,8 +59,9 @@ thereby accessed by means of an appropriate PKCS #11 module. For the
verification of the users' certificates, locally stored CA certificates
as well as online or locally accessible CRLs are used.
Additionally, the package includes pam_pkcs11-related tools: *
pkcs11_eventmgr: Generates actions on card insert, removal, or
Additionally, the package includes pam_pkcs11-related tools:
* pkcs11_eventmgr: Generates actions on card insert, removal, or
time-out events
* pklogin_finder: Gets the login name that maps to a certificate
@ -80,21 +81,7 @@ Conflicts: pam_pkcs11 < 0.6.9
API documentation for pam_pkcs11
This Linux PAM module allows X.509 a certificate-based user
authentication. The certificate and its dedicated private key are
thereby accessed by means of an appropriate PKCS #11 module. For the
verification of the users' certificates, locally stored CA certificates
as well as online or locally accessible CRLs are used.
Additionally, the package includes pam_pkcs11-related tools: *
pkcs11_eventmgr: Generates actions on card insert, removal, or
time-out events
* pklogin_finder: Gets the login name that maps to a certificate
* pkcs11_inspect: Inspects the contents of a certificate
* make_hash_links: Creates hash link directories for storing CAs and
CRLs
authentication.
%prep
%setup -q -n %{_name}-%{version}