head 1.15; access; symbols pkgsrc-2023Q4:1.15.0.4 pkgsrc-2023Q4-base:1.15 pkgsrc-2023Q3:1.15.0.2 pkgsrc-2023Q3-base:1.15 pkgsrc-2023Q2:1.14.0.8 pkgsrc-2023Q2-base:1.14 pkgsrc-2023Q1:1.14.0.6 pkgsrc-2023Q1-base:1.14 pkgsrc-2022Q4:1.14.0.4 pkgsrc-2022Q4-base:1.14 pkgsrc-2022Q3:1.14.0.2 pkgsrc-2022Q3-base:1.14 pkgsrc-2022Q2:1.13.0.6 pkgsrc-2022Q2-base:1.13 pkgsrc-2022Q1:1.13.0.4 pkgsrc-2022Q1-base:1.13 pkgsrc-2021Q4:1.13.0.2 pkgsrc-2021Q4-base:1.13 pkgsrc-2021Q3:1.11.0.48 pkgsrc-2021Q3-base:1.11 pkgsrc-2021Q2:1.11.0.46 pkgsrc-2021Q2-base:1.11 pkgsrc-2021Q1:1.11.0.44 pkgsrc-2021Q1-base:1.11 pkgsrc-2020Q4:1.11.0.42 pkgsrc-2020Q4-base:1.11 pkgsrc-2020Q3:1.11.0.40 pkgsrc-2020Q3-base:1.11 pkgsrc-2020Q2:1.11.0.36 pkgsrc-2020Q2-base:1.11 pkgsrc-2020Q1:1.11.0.16 pkgsrc-2020Q1-base:1.11 pkgsrc-2019Q4:1.11.0.38 pkgsrc-2019Q4-base:1.11 pkgsrc-2019Q3:1.11.0.34 pkgsrc-2019Q3-base:1.11 pkgsrc-2019Q2:1.11.0.32 pkgsrc-2019Q2-base:1.11 pkgsrc-2019Q1:1.11.0.30 pkgsrc-2019Q1-base:1.11 pkgsrc-2018Q4:1.11.0.28 pkgsrc-2018Q4-base:1.11 pkgsrc-2018Q3:1.11.0.26 pkgsrc-2018Q3-base:1.11 pkgsrc-2018Q2:1.11.0.24 pkgsrc-2018Q2-base:1.11 pkgsrc-2018Q1:1.11.0.22 pkgsrc-2018Q1-base:1.11 pkgsrc-2017Q4:1.11.0.20 pkgsrc-2017Q4-base:1.11 pkgsrc-2017Q3:1.11.0.18 pkgsrc-2017Q3-base:1.11 pkgsrc-2017Q2:1.11.0.14 pkgsrc-2017Q2-base:1.11 pkgsrc-2017Q1:1.11.0.12 pkgsrc-2017Q1-base:1.11 pkgsrc-2016Q4:1.11.0.10 pkgsrc-2016Q4-base:1.11 pkgsrc-2016Q3:1.11.0.8 pkgsrc-2016Q3-base:1.11 pkgsrc-2016Q2:1.11.0.6 pkgsrc-2016Q2-base:1.11 pkgsrc-2016Q1:1.11.0.4 pkgsrc-2016Q1-base:1.11 pkgsrc-2015Q4:1.11.0.2 pkgsrc-2015Q4-base:1.11 pkgsrc-2015Q3:1.10.0.14 pkgsrc-2015Q3-base:1.10 pkgsrc-2015Q2:1.10.0.12 pkgsrc-2015Q2-base:1.10 pkgsrc-2015Q1:1.10.0.10 pkgsrc-2015Q1-base:1.10 pkgsrc-2014Q4:1.10.0.8 pkgsrc-2014Q4-base:1.10 pkgsrc-2014Q3:1.10.0.6 pkgsrc-2014Q3-base:1.10 pkgsrc-2014Q2:1.10.0.4 pkgsrc-2014Q2-base:1.10 pkgsrc-2014Q1:1.10.0.2 pkgsrc-2014Q1-base:1.10 pkgsrc-2013Q4:1.9.0.4 pkgsrc-2013Q4-base:1.9 pkgsrc-2013Q3:1.9.0.2 pkgsrc-2013Q3-base:1.9 pkgsrc-2013Q2:1.8.0.4 pkgsrc-2013Q2-base:1.8 pkgsrc-2013Q1:1.8.0.2 pkgsrc-2013Q1-base:1.8 pkgsrc-2012Q4:1.7.0.2 pkgsrc-2012Q4-base:1.7 pkgsrc-2012Q3:1.6.0.4 pkgsrc-2012Q3-base:1.6 pkgsrc-2012Q2:1.6.0.2 pkgsrc-2012Q2-base:1.6 pkgsrc-2012Q1:1.4.0.2 pkgsrc-2012Q1-base:1.4 pkgsrc-2011Q4:1.2.0.2 pkgsrc-2011Q4-base:1.2 pkgsrc-base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.15 date 2023.07.25.13.59.57; author sborrill; state Exp; branches; next 1.14; commitid Bsg4XgroqP7iObyE; 1.14 date 2022.08.22.07.42.52; author sborrill; state Exp; branches; next 1.13; commitid 5ostj2AtUcofxQQD; 1.13 date 2021.10.26.11.17.21; author nia; state Exp; branches; next 1.12; commitid PNswNV9GDLZeojeD; 1.12 date 2021.10.07.14.54.04; author nia; state Exp; branches; next 1.11; commitid nfjKlj1wTplMcTbD; 1.11 date 2015.11.04.01.17.52; author agc; state Exp; branches; next 1.10; commitid agUNgZr58GM2fIHy; 1.10 date 2014.03.10.00.58.51; author pettai; state Exp; branches; next 1.9; commitid PI78puTFGr1qy5sx; 1.9 date 2013.09.14.07.46.33; author pettai; state Exp; branches; next 1.8; commitid GW2prBTe1E8Nun5x; 1.8 date 2013.03.16.20.52.38; author pettai; state Exp; branches; next 1.7; 1.7 date 2012.11.10.18.07.44; author pettai; state Exp; branches; next 1.6; 1.6 date 2012.04.07.19.38.43; author joerg; state Exp; branches; next 1.5; 1.5 date 2012.04.07.19.27.23; author dholland; state Exp; branches; next 1.4; 1.4 date 2012.04.07.13.16.23; author joerg; state Exp; branches; next 1.3; 1.3 date 2012.01.12.20.17.47; author pettai; state Exp; branches; next 1.2; 1.2 date 2011.12.14.09.04.13; author pettai; state Exp; branches; next 1.1; 1.1 date 2011.12.05.09.51.20; author pettai; state Exp; branches 1.1.1.1; next ; 1.1.1.1 date 2011.12.05.09.51.20; author pettai; state Exp; branches; next ; desc @@ 1.15 log @oath-toolkit: update to 2.6.9 Changes since 2.6.7: Version 2.6.9 (released 2023-07-09) Improve compatibility with recent libxmlsec. Update gnulib files, dropping gnulib self-tests. Version 2.6.8 (released 2023-07-09) libpskc: Fixes for recent libxmlsec releases. pam_oath: Provide fallback pam_modutil_getpwnam implementation. Fixes https://gitlab.com/oath-toolkit/oath-toolkit/-/issues/26 on Mac OS. pam_oath: Don't fail authentication when pam_modutil_getpwnam doesn't Regression introduced in previous release. pam_oath: Self-test improvements. liboath: Builds on Windows. The oath_authenticate_usersfile function is just a stub that returns an error. This allows for use of the rest of the library on Windows. Disable PAM self-tests on Mac. Fix --enable-root-tests logic. Don't ship gtk-doc PDFs in tarball. Use gitlog-to-changelog instead of git2cl. Codespell typo fixes. @ text @$NetBSD: distinfo,v 1.14 2022/08/22 07:42:52 sborrill Exp $ BLAKE2s (oath-toolkit-2.6.9.tar.gz) = 83f262a7827f0d5335d164719a15ed5d8b99b0d0c890c9aa0205a05a94265841 SHA512 (oath-toolkit-2.6.9.tar.gz) = 6e96b5a926f6e2448661fef267dcf9c99167b7bdfc71e319d2ab7ddc051a7be002043485547ad83744209c25ea0d87f8e28f25cccd6856281321f3d22e3cf160 Size (oath-toolkit-2.6.9.tar.gz) = 4693524 bytes @ 1.14 log @oath-toolkit: update to 2.6.7 Changes since 2.4.1: Version 2.6.7 (released 2021-05-01) pam_oath: Support variables in usersfile string parameter. the usersfile string in the pam_oath configuration file. The placeholder values allow the user credentials file to be stored in a file path that is relative to the user, and mimics similar behavior found in google-authenticator-libpam. The motivation for these changes is to allow for non-privileged processes to use pam_oath (e.g., for 2FA with xscreensaver). Non-privileged and non-suid programs are unable to use pam_oath. These changes are a proposed alternative to a suid helper binary as well. Thanks to Jason Graham for the patch. See https://gitlab.com/oath-toolkit/oath-toolkit/-/merge_requests/12. doc: Fix project URL in man pages. Thanks to Jason Graham for the patch. Fixes https://gitlab.com/oath-toolkit/oath-toolkit/-/issues/19. build: Drop use of libxml's AM_PATH_XML2 in favor of pkg-config. build: Modernize autotools usage. Most importantly, no longer use -Werror with AM_INIT_AUTOMAKE to make rebuilding from source more safe with future automake versions. Updated gnulib files. Version 2.6.6 (released 2021-01-20) oathtool: Handle HOTP --counter values larger than 0x7FFFFFFFFFFFFFFF. Thanks to Jason Lai for report. doc: GTK-DOC manual improvements. Updated gnulib files. Fixes test-parse-datetime self-check. Fixes https://gitlab.com/oath-toolkit/oath-toolkit/-/issues/20. Version 2.6.5 (released 2020-12-29) oathtool: Support for reading KEY and OTP from standard input or filename. KEY and OTP may now be given as - to mean stdin, or @@FILE to read from a particular file. This is recommended on multi-user systems, since secrets as command line parameters leak. Based on a patch from Ian Jackson. Fixes #6. pam_oath: Fix unlikely logic fail on out of memory conditions. Patch from Matthias Gerstner. Doc fixes. Version 2.6.4 (released 2020-11-11) libpskc: New --with-xmlsec-crypto-engine to hard-code crypto engine. Fixes https://gitlab.com/oath-toolkit/oath-toolkit/-/issues/16. Use it like --with-xmlsec-crypto-engine=gnutls or --with-xmlsec-crypto-engine=openssl if the default dynamic loading fails because of runtime linker search path issues. oathtool --totp --verbose now prints TOTP hash mode. Fixes https://gitlab.com/oath-toolkit/oath-toolkit/-/issues/4. oathtool: Hash names (e.g., SHA256) for --totp are now upper case. Fixes https://gitlab.com/oath-toolkit/oath-toolkit/-/issues/3. Lower/mixed case hash names are supported for compatibility. pam_oath: Fail gracefully for missing users. Fixes https://savannah.nongnu.org/support/index.php?109111. This allows you to incrementally add support for OATH authentication instead of forcing it on all users. See updated pam_oath/README on the [user_unknown=ignore success=ok] parameter that can now be supplied to PAM configuration. Patch by Antoine Beaupra Fix libpskc memory corruption bug. Fixes https://savannah.nongnu.org/support/?108736. Thanks to David Woodhouse and Jaroslav A karvada for report, self check and patch. Fix man pages. Fixes https://savannah.nongnu.org/support/?108312. Thanks to Jaroslav A karvada for the patch. Build fixes. Version 2.6.3 (released 2020-11-07) pam_oath: Fix self-tests. build: Update gnulib. Fix compiler warnings. Doc fixes. Version 2.6.2 (released 2016-08-27) doc: Version controlled source code repository moved to GitLab. Version 2.6.1 (released 2015-07-31) liboath: Fix make check on 32-bit systems. Report and patch by Christian Hesse. Version 2.6.0 (released 2015-05-19) liboath: Support TOTP with HMAC-SHA256 and HMAC-SHA512. This adds new APIs oath_totp_generate2, oath_totp_validate4 and oath_totp_validate4_callback. oathtool: The --totp parameter now take an optional argument to specify MAC. For example use --totp=sha256 to use HMAC-SHA256. When --totp is used the default HMAC-SHA1 is used, as before. pam_oath: Mention in README that you shouldn???t use insecure keys. Suggested by Robin. pam_oath: Check return value from strdup. Patch by Eero Hakkinen. The files gdoc and expect.oath are now included in the tarball. Suggested by Jaroslav A karvada. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.13 2021/10/26 11:17:21 nia Exp $ d3 3 a5 9 BLAKE2s (oath-toolkit-2.6.7.tar.gz) = 60abf1cd8341cc5ed887aea4c58928bfcac3347ab43dd3704bd69cf5e9a7e5ec SHA512 (oath-toolkit-2.6.7.tar.gz) = 50edff75c8366887d69cf4740c4cc3bdfc3e43cbd4910ff40f735bca489f0953d7e5a21130f12782ac7a1f2fb00f0db313aff139085f23daba78a69bc7b2eb12 Size (oath-toolkit-2.6.7.tar.gz) = 5625279 bytes SHA1 (patch-liboath_gl_fflush.c) = 65b10470b8ba45973d11e3bdf32b9511461f87dc SHA1 (patch-pam__oath_Makefile.in) = c3fd5dea44e6c604e77dbe81ff7b062dc12925bf SHA1 (patch-pam__oath_configure.ac) = 525c51b98d0fc444440aa77a9b821b4c820cca31 SHA1 (patch-pam__oath_pam__modutil.c) = f60b9d7a71efd79425be7ca3257d1a37b3d806fb SHA1 (patch-pam__oath_pam__modutil.h) = fe361f7430cf8a26c74653b4dbc42c01825f90f2 SHA1 (patch-pam__oath_pam__oath.c) = f138397e7f5593f248c3ff761449b968ce6d9129 @ 1.13 log @security: Replace RMD160 checksums with BLAKE2s checksums All checksums have been double-checked against existing RMD160 and SHA512 hashes Unfetchable distfiles (fetched conditionally?): ./security/cyrus-sasl/distinfo cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2 @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.12 2021/10/07 14:54:04 nia Exp $ d3 9 a11 5 BLAKE2s (oath-toolkit-2.4.1.tar.gz) = 1c708e16554736cfe5d38e4b6ff4e2eda945c9bc72cfb889f0ce4aec6078c44d SHA512 (oath-toolkit-2.4.1.tar.gz) = 2a3440d5c97afef00dacd235d5471e8bf68086dfdb20234a894e7534d75670808fef444fe1062525800bc5ffe368898302e6cf250cd76b7238cd602d7d05e89b Size (oath-toolkit-2.4.1.tar.gz) = 4136649 bytes SHA1 (patch-liboath_gl_fflush.c) = d957eed6c3e653ee53bbcf0b95b0c032f092b07d SHA1 (patch-liboath_gl_fseeko.c) = bd67a1af8c01a2dbf849f8612cbb18470cb3b248 @ 1.12 log @security: Remove SHA1 hashes for distfiles @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.11 2015/11/04 01:17:52 agc Exp $ d3 1 a3 1 RMD160 (oath-toolkit-2.4.1.tar.gz) = d902ebef5b0468f383bcb15a9e8b0582011eb4ca @ 1.11 log @Add SHA512 digests for distfiles for security category Problems found locating distfiles: Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz Package libidea: missing distfile libidea-0.8.2b.tar.gz Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2 Package uvscan: missing distfile vlp4510e.tar.Z Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.10 2014/03/10 00:58:51 pettai Exp $ a2 1 SHA1 (oath-toolkit-2.4.1.tar.gz) = b0ca4c5f89c12c550f7227123c2f21f45b2bf969 @ 1.10 log @Version 2.4.1 (released 2014-02-12) * liboath: Fix usersfile bug that caused it to update the wrong line. When an usersfile contain multiple lines for the same user but with an unparseable token type (e.g., HOTP vs TOTP), the code would update the wrong line of the file. Since the then updated line could be a commented out line, this can lead to the same OTP being accepted multiple times which is a security vulnerability. CVE-2013-7322 CVs: ---------------------------------------------------------------------- @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.9 2013/09/14 07:46:33 pettai Exp $ d5 1 @ 1.9 log @Version 2.4.0 (released 2013-07-21) * liboath: Add new API methods for validating TOTP OTPs The new methods (oath_totp_validate3 and oath_totp_validate3_callback) introduce a new parameter *otp_counter, which is set to the actual counter used to calculate the OTP (unless it is a NULL pointer). This allows for easier OTP replay detection in applications using liboath. Patch from Fabian Grünbichler . Version 2.2.0 (released 2013-07-07) * libpskc: Add functions for setting PSKC data. The new functions are pskc_add_keypackage and all pskc_set_* functions (see libpskc/include/pskc/keypackage.h). This allow you to write programs that generate new PSKC structures. * liboath: Permit different passwords for different tokens for the same user. Thanks to Christian Hesse . * build: Improve building from git with most recent automake and gengetopt. Thanks to Christian Hesse . * build: Valgrind is not enabled by default. It causes too much false positives. For developers who want, use --enable-valgrind-tests. It is still enabled by default when building from the version controlled sources (see cfg.mk). Thanks to Christian Hesse . * liboath: Make header file usable from C++ (extern "C" guard). Reported by Alan Markus . @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.8 2013/03/16 20:52:38 pettai Exp $ d3 3 a5 3 SHA1 (oath-toolkit-2.4.0.tar.gz) = 89d2cd30dd401a3f6973ec3c2b26f1cb737764a7 RMD160 (oath-toolkit-2.4.0.tar.gz) = a0b4b48c861a4408232ad4f2784e83a5c57a939c Size (oath-toolkit-2.4.0.tar.gz) = 4137994 bytes @ 1.8 log @Version 2.0.2 (released 2013-01-08) * oathtool: Base32 decoding of keys are now more liberal in what accepts. It can now accept keys on the "gr6d 5br7 25s6 vnck v4vl hlao re" format, i.e., base32 data delimited using SPC and without padding. The old proper base32 format is still supported. * liboath: oath_base32_decode now ignores SPC and adds pad characters. * liboath: If password in usersfile is + then ignore supplied password. This enables the pam_oath module to be used with external password verification. Based on patch from Ilkka Virta . * tests: Fixed expiry date of some certificates used in the test suite. The last release would only complete 'make check' during a 30 day window. * API and ABI is backwards compatible with the previous version. Version 2.0.1 (released 2012-10-24) * libpskc, pskctool: Support sign and verify of PSKC data using XML DigSig. * libpskc: XML Schema validation modified. The entire PSKC schema is now supported (before the XML Digital Signatures and Encryption parts were removed). The code now assumes that the schema is available in the local XML catalog. Thanks to Liam Quin for hints about XML catalogs. * pskctool: the --check (-c) parameter was renamed to --info (-i). * API and ABI is backwards compatible with the previous version. Version 2.0.0 (released 2012-10-10) * libpskc, pskctool: New components. The OATH Toolkit now supports the Portable Symmetric Key Container (PSKC) data format specified in RFC 6030 for dealing with key provisioning. There is a new low-level library libpskc for managing PSKC data for application developers and a new command line tool pskctool for interacting with PSKC data for users. The PSKC functionality depends on Libxml2 . It can be disabled unconditionally using the ./configure-parameter --disable-pskc. * liboath: Add manpages for library API. * API and ABI is backwards compatible with the previous version. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.7 2012/11/10 18:07:44 pettai Exp $ d3 3 a5 3 SHA1 (oath-toolkit-2.0.2.tar.gz) = 3672924a9d9c3373ec62a6b79e9aa1e846c4d178 RMD160 (oath-toolkit-2.0.2.tar.gz) = 751beac5e9b34c0905cfbb4bd58ee7c6b379fd65 Size (oath-toolkit-2.0.2.tar.gz) = 3946021 bytes @ 1.7 log @Version 1.12.6 (released 2012-09-04) * liboath: The usersfile is now fflush'ed and fsync'ed. * liboath: A memory leak fixed. * oathtool: The --counter parameter now works on 32-bit platforms. * API and ABI is backwards compatible with the previous version. OATH_FILE_FLUSH_ERROR: Added. OATH_FILE_SYNC_ERROR: Added. OATH_FILE_CLOSE_ERROR: Added. OATH_LAST_ERROR: Added. Version 1.12.5 (released 2012-08-19) * oathtool: The --counter parameter now supports larger values. Before it used an 'int' type and now it uses a 'longlong' type. Needed for eSecuTech tokens as they use a 64-bit value for their initial counter. see . * Added gnulib self-tests. * API and ABI is backwards compatible with the previous version. Version 1.12.4 (released 2012-06-17) * liboath: Usersfile code handles multiple lines for a single user. This can be used when a single user carries multiple tokens (with different OATH secrets) and any of them should be permitted. * API and ABI is backwards compatible with the previous version. Version 1.12.3 (released 2012-05-31) * pam_oath: Fix "try_first_pass". * API and ABI is backwards compatible with the previous version. Version 1.12.2 (released 2012-04-04) * liboath: usersfile function now works on FreeBSD. * tests: liboath usersfile self-test is skipped if there is no datefudge. * API and ABI is backwards compatible with the previous version. Version 1.12.1 (released 2012-04-01) * liboath, oathtool: Base32 decoding now permit lowercase characters. * API and ABI is backwards compatible with the previous version. Version 1.12.0 (released 2012-04-01) * oathtool: Added --base32 parameter to decode base32 keys. * oathtool: Verbose output (-v) now print key data in base32 format too. * liboath: Added base32 functions. Added hex encoding function. The new APIs are oath_bin2hex, oath_base32_decode, and oath_base32_encode. * liboath: Gnulib's snprintf is used for better portability. The system snprintf is known to have bugs on some systems, see the Gnulib manual for more information. * API and ABI is backwards compatible with the previous version. oath_bin2hex: New function. oath_base32_decode: New function. oath_base32_encode: New function. OATH_INVALID_BASE32: New error code. OATH_BASE32_OVERFLOW: New error code. OATH_MALLOC_ERROR: New error code. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.6 2012/04/07 19:38:43 joerg Exp $ d3 4 a6 4 SHA1 (oath-toolkit-1.12.6.tar.gz) = e1d116d7a60aca902b880cd99d542f7896f21e39 RMD160 (oath-toolkit-1.12.6.tar.gz) = dd6613531f770042b113230f7d42c49a302f6e89 Size (oath-toolkit-1.12.6.tar.gz) = 2275393 bytes SHA1 (patch-liboath_gl_fflush.c) = 5a1ff1a9ae740e55816fbd5d33f01145e52368a4 @ 1.6 log @Revert. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.5 2012/04/07 19:27:23 dholland Exp $ d3 5 a7 5 SHA1 (oath-toolkit-1.10.5.tar.gz) = b3fddfbc442c7cffe854ec159466155ef6ce0cbc RMD160 (oath-toolkit-1.10.5.tar.gz) = 52c09b838b10df8536e3f122e1b829eec1f830f4 Size (oath-toolkit-1.10.5.tar.gz) = 1876773 bytes SHA1 (patch-liboath_gl_fflush.c) = d2e61f4beb861dbb151ab576f2773d66698d0e7d SHA1 (patch-liboath_gl_fseeko.c) = 0c19a2b46df8fd3e5ba7be0836063a1da5ae8e52 @ 1.5 log @Regen properly for patches in last commit. Hi Joerg... @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.4 2012/04/07 13:16:23 joerg Exp $ d6 2 a7 2 SHA1 (patch-liboath_gl_fflush.c.diff) = c8b4f4c563100a056ece75e4dd26ea0a572bf66b SHA1 (patch-liboath_gl_fseeko.c.diff) = a46e6c4dd2bc04ec518aabfad35b011036f4e823 @ 1.4 log @Fix build on NetBSD/current. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.3 2012/01/12 20:17:47 pettai Exp $ d6 2 a7 2 SHA1 (patch-liboath_gl_fflush.c) = d2e61f4beb861dbb151ab576f2773d66698d0e7d SHA1 (patch-liboath_gl_fseeko.c) = 0c19a2b46df8fd3e5ba7be0836063a1da5ae8e52 @ 1.3 log @Version 1.10.5 * Build fixes from Linus Nordberg and Arno Hautala. * Update gnulib files. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.2 2011/12/14 09:04:13 pettai Exp $ d6 2 @ 1.2 log @Version 1.10.4 * liboath: Fix build so that OATH_VERSION_NUMBER is actually defined. It was an empty value in the last release due to a bug in the build scripts. Version 1.10.3 * liboath: Allow strcmp callback to return negative to signal errors. * Fix bugs in build scripts for generating version numbers. * Update gnulib files. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.1.1.1 2011/12/05 09:51:20 pettai Exp $ d3 3 a5 3 SHA1 (oath-toolkit-1.10.4.tar.gz) = 0188b49c8634ec7331daf94dc229ec946eb171a9 RMD160 (oath-toolkit-1.10.4.tar.gz) = 4c8844d50be236aa2d6bfe8b2ec54b02930a174c Size (oath-toolkit-1.10.4.tar.gz) = 1830631 bytes @ 1.1 log @Initial revision @ text @d1 1 a1 1 $NetBSD$ d3 3 a5 3 SHA1 (oath-toolkit-1.10.2.tar.gz) = 899b6435011c9bd92be471ce2b5d252199c50289 RMD160 (oath-toolkit-1.10.2.tar.gz) = d91ae24d4f1146dd129890397b30d81f119e3e6f Size (oath-toolkit-1.10.2.tar.gz) = 1815804 bytes @ 1.1.1.1 log @The OATH Toolkit contains a shared library, command line tool and a PAM module that makes it possible to build one-time password authentication systems. Supported technologies include the event-based HOTP algorithm and the time-based TOTP algorithm. OATH is the Open AuTHentication organization which specify the algorithms. @ text @@