1
0

Accepting request 335876 from home:Simmphonie:yubico

OBS-URL: https://build.opensuse.org/request/show/335876
OBS-URL: https://build.opensuse.org/package/show/security/yubico-piv-tool?expand=0&rev=6
This commit is contained in:
Torsten Gruner 2015-10-02 09:42:06 +00:00 committed by Git OBS Bridge
parent e040d39612
commit db7a4c251b
5 changed files with 42 additions and 10 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:eff765169153fdf75ba4ff48eb2e4748f62623760bb5c15e4cce89b7263f59bb
size 416611

View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:4cec162dda45851741a3b58c492797cc051ef59192ca35a3bdd125fc2ebd6210
size 410065

Binary file not shown.

View File

@ -1,3 +1,34 @@
-------------------------------------------------------------------
Thu Oct 1 21:18:34 UTC 2015 - t.gruner@katodev.de
- Version 1.0.3 (released 2015-10-01)
- Correct wording on unblock-pin action.
- Show pin retries correctly.
- Use a bigger buffer for receiving data.
-------------------------------------------------------------------
Tue Sep 15 13:32:27 UTC 2015 - t.gruner@katodev.de
- Version 1.0.2 (released 2015-09-04)
- Query for different passwords/pins on stdin if theyre not supplied.
- If a reader fails continue trying matching readers.
- Authentication failed is supposed to be 0x63cX not 0x630X.
-------------------------------------------------------------------
Sat Jul 11 14:49:43 UTC 2015 - t.gruner@katodev.de
- Version 1.0.1 (released 2015-07-10)
- Project relicensed to 2-clause BSD license
- Minor fixes found with clang scan-build
-------------------------------------------------------------------
Wed Jul 8 21:14:24 UTC 2015 - t.gruner@katodev.de
- Version 1.0.0 (released 2015-06-23)
- Add a test-decipher action.
- Check that e is 0x10001 on importing rsa keys
- Use PCSC transactions when sending and receiving data
-------------------------------------------------------------------
Mon Apr 27 16:22:36 UTC 2015 - cdenicolo@suse.com

View File

@ -1,7 +1,7 @@
#
# spec file for package yubico-piv-tool
#
# Copyright (c) 2015 SUSE LINUX Products GmbH, Nuernberg, Germany.
# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@ -15,24 +15,25 @@
# Please submit bugfixes or comments via http://bugs.opensuse.org/
#
%define soname 1
Name: yubico-piv-tool
Version: 0.1.6
Version: 1.0.3
Release: 0
Summary: Yubico YubiKey NEO CCID Manager
License: GPL-3.0+
License: BSD-2-Clause
Group: Productivity/Networking/Security
Url: https://developers.yubico.com/
Source0: https://developers.yubico.com/yubico-piv-tool/Releases/%{name}-%{version}.tar.gz
Source1: https://developers.yubico.com/yubico-piv-tool/Releases/%{name}-%{version}.tar.gz.sig
BuildRoot: %{_tmppath}/%{name}-%{version}-build
BuildRequires: pkg-config
BuildRequires: libtool
BuildRequires: pcsc-lite-devel
BuildRequires: pkgconfig(openssl)
BuildRequires: pkg-config
BuildRequires: pkgconfig(openssl)
Requires: libykpiv%{soname} = %{version}
%description
This is a command line tool to interact with the PIV applet on a YubiKey NEO.
Among other functions it supports, generating keys on device, importing keys
@ -80,7 +81,7 @@ sed -i 's|^runpath_var=LD_RUN_PATH|runpath_var=DIE_RPATH_DIE|g' libtool
%files -n libykpiv%{soname}
%defattr(-,root,root)
%{_libdir}/libykpiv.so.%{soname}
%{_libdir}/libykpiv.so.%{soname}.0.4
%{_libdir}/libykpiv.so.%{soname}.0.8
%files -n libykpiv-devel
%defattr(-,root,root)