Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mail.netbsd.org", Issuer "Postmaster NetBSD.org" (verified OK)) by mollari.NetBSD.org (Postfix) with ESMTPS id 840E8A409E for ; Thu, 13 Mar 2014 22:18:03 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id E8E9214A3D3; Thu, 13 Mar 2014 22:18:02 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 62EE614A3CD for ; Thu, 13 Mar 2014 22:18:00 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id RjSaQJ-nS2xi for ; Thu, 13 Mar 2014 22:17:59 +0000 (UTC) Received: from cvs.netbsd.org (cvs.NetBSD.org [IPv6:2001:4f8:3:7:2e0:81ff:fe30:95bd]) by mail.netbsd.org (Postfix) with ESMTP id 31EED14A3BB for ; Thu, 13 Mar 2014 22:17:59 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id 2721D96; Thu, 13 Mar 2014 22:17:59 +0000 (UTC) Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" MIME-Version: 1.0 Date: Thu, 13 Mar 2014 22:17:59 +0000 From: "Fredrik Pettai" Subject: CVS commit: pkgsrc/security/ykpers To: pkgsrc-changes@NetBSD.org Reply-To: pettai@netbsd.org X-Mailer: log_accum Message-Id: <20140313221759.2721D96@cvs.netbsd.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: pettai Date: Thu Mar 13 22:17:59 UTC 2014 Modified Files: pkgsrc/security/ykpers: Makefile distinfo Log Message: Version 1.15.1 (released 2014-03-12) * Add -6 and -8 flags to ykchalresp to output the response as a truncated OATH code. * Add -t to ykchalresp to use current time / 30 as challenge in TOTP fashion. * Fix for a crash in the libusb-0.1 backend. Version 1.15.0 (released 2014-01-10) * add new Neo version 3.2 as supported. * let ykp_AES_key_from_password() return error if it can't get a random salt. * let -a without option mean ask for raw key on STDIN. * let no -a given mean generate a random key * add ykp_AES_key_from_raw() and ykp_HMAC_key_from_raw() that sets the key from a byte array. * remove -osalt= and possibility to generate key from password. * add YK_ENODATA that's returned when no data is returned from the device and no other underlying error is set. To generate a diff of this commit: cvs rdiff -u -r1.9 -r1.10 pkgsrc/security/ykpers/Makefile \ pkgsrc/security/ykpers/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.