Makes it possible to build one-time password authentication systems

Edit Package oath-toolkit

Makes it possible to build one-time password authentication systems

Refresh
Refresh
Source Files
Filename Size Changed
oath-toolkit-2.6.5.tar.gz 0005477292 5.22 MB
oath-toolkit-2.6.5.tar.gz.sig 0000000119 119 Bytes
oath-toolkit.changes 0000006900 6.74 KB
oath-toolkit.keyring 0000001314 1.28 KB
oath-toolkit.spec 0000006336 6.19 KB
Revision 25 (latest revision is 38)
Torsten Gruner's avatar Torsten Gruner (Simmphonie) accepted request 859201 from Martin Hauke's avatar Martin Hauke (mnhauke) (revision 25)
- Update to version 2.6.5
  * oathtool: Support for reading KEY and OTP from standard input
    or filename.
    KEY and OTP may now be given as '-' to mean stdin, or @FILE to
    read from a particular file.  This is recommended on multi-user
    systems, since secrets as command line parameters leak.
  * pam_oath: Fix unlikely logic fail on out of memory conditions.
  * Doc fixes.
- Update to version 2.6.4
  * libpskc: New --with-xmlsec-crypto-engine to hard-code crypto
    engine.  Use it like --with-xmlsec-crypto-engine=gnutls or
    --with-xmlsec-crypto-engine=openssl if the default dynamic
    loading fails because of runtime linker search path issues.
  * oathtool --totp --verbose now prints TOTP hash mode.
  * oathtool: Hash names (e.g., SHA256) for --totp are now upper
    case.  Lower/mixed case hash names are supported for
    compatibility.
  * pam_oath: Fail gracefully for missing users.
    This allows you to incrementally add support for OATH
    authentication instead of forcing it on all users.
  * Fix libpskc memory corruption bug.
  * Fix man pages.
  * Build fixes.
- Update to version 2.6.3
  * pam_oath: Fix self-tests.
- Drop not longer needed patches:
  * 0001-Fix-no-return-in-nonvoid-function-errors-reported-by.patch
  * 0003-pam_oath-assign-safe-default-to-alwaysok-config-memb.patch
  * 0002-update_gnulibs_files.patch
  * gnulib-libio.patch
Comments 0
openSUSE Build Service is sponsored by