Hello community, here is the log from the commit of package pam_u2f for openSUSE:Factory checked in at 2015-11-11 10:31:55 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/pam_u2f (Old) and /work/SRC/openSUSE:Factory/.pam_u2f.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "pam_u2f" Changes: -------- --- /work/SRC/openSUSE:Factory/pam_u2f/pam_u2f.changes 2015-10-14 16:44:32.000000000 +0200 +++ /work/SRC/openSUSE:Factory/.pam_u2f.new/pam_u2f.changes 2015-11-11 10:36:12.000000000 +0100 @@ -1,0 +2,7 @@ +Fri Nov 6 22:00:05 UTC 2015 - [email protected] + +- Version 1.0.3 (released 2015-11-02) + - Bugfix in pamu2fcfg. + - Minor improvements for verbose mode in pamu2fcfg. + +------------------------------------------------------------------- Old: ---- pam_u2f-1.0.2.tar.gz pam_u2f-1.0.2.tar.gz.sig New: ---- pam_u2f-1.0.3.tar.gz pam_u2f-1.0.3.tar.gz.sig ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ pam_u2f.spec ++++++ --- /var/tmp/diff_new_pack.DptWSy/_old 2015-11-11 10:36:12.000000000 +0100 +++ /var/tmp/diff_new_pack.DptWSy/_new 2015-11-11 10:36:12.000000000 +0100 @@ -17,7 +17,7 @@ Name: pam_u2f -Version: 1.0.2 +Version: 1.0.3 Release: 0 Summary: Allows you to use U2F to authenticate against PAM License: BSD-2-Clause ++++++ pam_u2f-1.0.2.tar.gz -> pam_u2f-1.0.3.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/pam_u2f-1.0.2/ChangeLog new/pam_u2f-1.0.3/ChangeLog --- old/pam_u2f-1.0.2/ChangeLog 2015-10-06 13:57:12.000000000 +0200 +++ new/pam_u2f-1.0.3/ChangeLog 2015-11-02 15:36:55.000000000 +0100 @@ -1,3 +1,20 @@ +2015-11-01 Alessio Di Mauro <[email protected]> + + * pamu2fcfg/pamu2fcfg.c: Check the correct return value in + pamu2fcfg. + +2015-10-20 Alessio Di Mauro <[email protected]> + + * : Merge pull request #24 from astronouth7303/patch-1 Properly tag `perror()` call for `getlogin()`. + +2015-10-07 Alessio Di Mauro <[email protected]> + + * util.c: Tie messages to debug flag more. + +2015-10-06 Alessio Di Mauro <[email protected]> + + * NEWS, configure.ac: Bump versions. + 2015-10-06 Alessio Di Mauro <[email protected]> * NEWS: Version 1.0.2. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/pam_u2f-1.0.2/NEWS new/pam_u2f-1.0.3/NEWS --- old/pam_u2f-1.0.2/NEWS 2015-10-06 13:53:53.000000000 +0200 +++ new/pam_u2f-1.0.3/NEWS 2015-11-02 15:34:38.000000000 +0100 @@ -2,6 +2,10 @@ pam-u2f NEWS -- History of user-visible changes. -*- outline -*- +* Version 1.0.3 (released 2015-11-02) + ** Bugfix in pamu2fcfg. + ** Minor improvements for verbose mode in pamu2fcfg. + * Version 1.0.2 (released 2015-10-06) ** Changes to automake flags. ** Improve build on OS X. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/pam_u2f-1.0.2/configure new/pam_u2f-1.0.3/configure --- old/pam_u2f-1.0.2/configure 2015-06-30 17:23:54.000000000 +0200 +++ new/pam_u2f-1.0.3/configure 2015-10-06 14:02:22.000000000 +0200 @@ -1,6 +1,6 @@ #! /bin/sh # Guess values for system-dependent variables and create Makefiles. -# Generated by GNU Autoconf 2.69 for pam_u2f 1.0.2. +# Generated by GNU Autoconf 2.69 for pam_u2f 1.0.3. # # Report bugs to <[email protected]>. # @@ -590,8 +590,8 @@ # Identity of this package. PACKAGE_NAME='pam_u2f' PACKAGE_TARNAME='pam_u2f' -PACKAGE_VERSION='1.0.2' -PACKAGE_STRING='pam_u2f 1.0.2' +PACKAGE_VERSION='1.0.3' +PACKAGE_STRING='pam_u2f 1.0.3' PACKAGE_BUGREPORT='[email protected]' PACKAGE_URL='' @@ -1329,7 +1329,7 @@ # Omit some internal or obsolete options to make the list less imposing. # This message is too long to be a string in the A/UX 3.1 sh. cat <<_ACEOF -\`configure' configures pam_u2f 1.0.2 to adapt to many kinds of systems. +\`configure' configures pam_u2f 1.0.3 to adapt to many kinds of systems. Usage: $0 [OPTION]... [VAR=VALUE]... @@ -1399,7 +1399,7 @@ if test -n "$ac_init_help"; then case $ac_init_help in - short | recursive ) echo "Configuration of pam_u2f 1.0.2:";; + short | recursive ) echo "Configuration of pam_u2f 1.0.3:";; esac cat <<\_ACEOF @@ -1520,7 +1520,7 @@ test -n "$ac_init_help" && exit $ac_status if $ac_init_version; then cat <<\_ACEOF -pam_u2f configure 1.0.2 +pam_u2f configure 1.0.3 generated by GNU Autoconf 2.69 Copyright (C) 2012 Free Software Foundation, Inc. @@ -1889,7 +1889,7 @@ This file contains any messages produced by compilers while running configure, to aid debugging if configure makes a mistake. -It was created by pam_u2f $as_me 1.0.2, which was +It was created by pam_u2f $as_me 1.0.3, which was generated by GNU Autoconf 2.69. Invocation command line was $ $0 $@ @@ -2753,7 +2753,7 @@ # Define the identity of the package. PACKAGE='pam_u2f' - VERSION='1.0.2' + VERSION='1.0.3' cat >>confdefs.h <<_ACEOF @@ -13248,7 +13248,7 @@ # report actual input values of CONFIG_FILES etc. instead of their # values after options handling. ac_log=" -This file was extended by pam_u2f $as_me 1.0.2, which was +This file was extended by pam_u2f $as_me 1.0.3, which was generated by GNU Autoconf 2.69. Invocation command line was CONFIG_FILES = $CONFIG_FILES @@ -13305,7 +13305,7 @@ cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1 ac_cs_config="`$as_echo "$ac_configure_args" | sed 's/^ //; s/[\\""\`\$]/\\\\&/g'`" ac_cs_version="\\ -pam_u2f config.status 1.0.2 +pam_u2f config.status 1.0.3 configured by $0, generated by GNU Autoconf 2.69, with options \\"\$ac_cs_config\\" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/pam_u2f-1.0.2/configure.ac new/pam_u2f-1.0.3/configure.ac --- old/pam_u2f-1.0.2/configure.ac 2015-06-18 10:26:31.000000000 +0200 +++ new/pam_u2f-1.0.3/configure.ac 2015-10-06 14:01:57.000000000 +0200 @@ -1,7 +1,7 @@ # Copyright (C) 2014-2015 Yubico AB - See COPYING # -AC_INIT([pam_u2f], [1.0.2], [[email protected]]) +AC_INIT([pam_u2f], [1.0.3], [[email protected]]) AC_CONFIG_AUX_DIR([build-aux]) AC_CONFIG_MACRO_DIR([m4]) AM_INIT_AUTOMAKE([1.11 foreign -Wall -Werror]) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/pam_u2f-1.0.2/man/pam_u2f.8 new/pam_u2f-1.0.3/man/pam_u2f.8 --- old/pam_u2f-1.0.2/man/pam_u2f.8 2015-07-10 20:08:09.000000000 +0200 +++ new/pam_u2f-1.0.3/man/pam_u2f.8 2015-10-06 14:04:54.000000000 +0200 @@ -2,12 +2,12 @@ .\" Title: pam_u2f .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author] .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> -.\" Date: Version 1.0.2 +.\" Date: Version 1.0.3 .\" Manual: PAM U2F Module Manual .\" Source: pam-u2f .\" Language: English .\" -.TH "PAM_U2F" "8" "Version 1\&.0\&.2" "pam\-u2f" "PAM U2F Module Manual" +.TH "PAM_U2F" "8" "Version 1\&.0\&.3" "pam\-u2f" "PAM U2F Module Manual" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/pam_u2f-1.0.2/man/pamu2fcfg.1 new/pam_u2f-1.0.3/man/pamu2fcfg.1 --- old/pam_u2f-1.0.2/man/pamu2fcfg.1 2015-07-10 20:08:10.000000000 +0200 +++ new/pam_u2f-1.0.3/man/pamu2fcfg.1 2015-10-06 14:04:55.000000000 +0200 @@ -2,12 +2,12 @@ .\" Title: pamu2fcfg .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author] .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> -.\" Date: Version 1.0.2 +.\" Date: Version 1.0.3 .\" Manual: PAM U2F Configuration Tool .\" Source: pamu2fcfg .\" Language: English .\" -.TH "PAMU2FCFG" "1" "Version 1\&.0\&.2" "pamu2fcfg" "PAM U2F Configuration Tool" +.TH "PAMU2FCFG" "1" "Version 1\&.0\&.3" "pamu2fcfg" "PAM U2F Configuration Tool" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/pam_u2f-1.0.2/pamu2fcfg/pamu2fcfg.c new/pam_u2f-1.0.3/pamu2fcfg/pamu2fcfg.c --- old/pam_u2f-1.0.2/pamu2fcfg/pamu2fcfg.c 2015-07-10 20:06:57.000000000 +0200 +++ new/pam_u2f-1.0.3/pamu2fcfg/pamu2fcfg.c 2015-11-01 17:20:12.000000000 +0100 @@ -109,20 +109,20 @@ else { user = getlogin(); if (!user) { - perror("gethostname"); + perror("getlogin"); exit(EXIT_FAILURE); } } if (u2fh_global_init(args_info.debug_flag ? U2FS_DEBUG : 0) != U2FH_OK || u2fh_devs_init(&devs) != U2FH_OK) { - fprintf(stderr, "Unable to initialize libu2f-host"); + fprintf(stderr, "Unable to initialize libu2f-host\n"); exit(EXIT_FAILURE); } h_rc = u2fh_devs_discover(devs, &max_index); if (h_rc != U2FH_OK && h_rc != U2FH_NO_U2F_DEVICE) { - fprintf(stderr, "Unable to discover device(s), %s (%d)", + fprintf(stderr, "Unable to discover device(s), %s (%d)\n", u2fh_strerror(h_rc), h_rc); exit(EXIT_FAILURE); } @@ -157,7 +157,7 @@ s_rc = u2fs_registration_challenge(ctx, &p); if (s_rc != U2FS_OK) { - fprintf(stderr, "Unable to generate registration challenge, %s (%d)", + fprintf(stderr, "Unable to generate registration challenge, %s (%d)\n", u2fs_strerror(s_rc), s_rc); exit(EXIT_FAILURE); } @@ -165,9 +165,9 @@ h_rc = u2fh_register(devs, p, origin, &response, U2FH_REQUEST_USER_PRESENCE); - if (s_rc != U2FS_OK) { - fprintf(stderr, "Unable to generate registration challenge, %s (%d)", - u2fs_strerror(s_rc), s_rc); + if (h_rc != U2FS_OK) { + fprintf(stderr, "Unable to generate registration challenge, %s (%d)\n", + u2fh_strerror(h_rc), h_rc); exit(EXIT_FAILURE); } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/pam_u2f-1.0.2/util.c new/pam_u2f-1.0.3/util.c --- old/pam_u2f-1.0.2/util.c 2015-10-05 16:13:37.000000000 +0200 +++ new/pam_u2f-1.0.3/util.c 2015-10-07 10:23:25.000000000 +0200 @@ -102,16 +102,6 @@ break; } - /*if (!s_token) { // Check not needed, s_token can never be NULL - if (verbose) - D(("Unable to retrieve keyHandle number %d", i + 1)); - fclose(opwfile); - *n_devs = 0; - free(buf); - buf = NULL; - return retval; - }*/ - if (verbose) D(("KeyHandle for device number %d: %s", i + 1, s_token)); @@ -228,12 +218,14 @@ unsigned max_index_prev = 0; if (u2fh_global_init(0) != U2FH_OK || u2fh_devs_init(&devs) != U2FH_OK) { - D(("Unable to initialize libu2f-host")); + if (cfg->debug) + D(("Unable to initialize libu2f-host")); return retval; } if ((h_rc = u2fh_devs_discover(devs, &max_index)) != U2FH_OK) { - D(("Unable to discover device(s), %s", u2fh_strerror(h_rc))); + if (cfg->debug) + D(("Unable to discover device(s), %s", u2fh_strerror(h_rc))); return retval; } else if (cfg->manual == 0) { if (cfg->cue) { @@ -246,17 +238,20 @@ D(("Device max index is %u", max_index)); if (u2fs_global_init(0) != U2FS_OK || u2fs_init(&ctx) != U2FS_OK) { - D(("Unable to initialize libu2f-server")); + if (cfg->debug) + D(("Unable to initialize libu2f-server")); return retval; } if ((s_rc = u2fs_set_origin(ctx, cfg->origin)) != U2FS_OK) { - D(("Unable to set origin: %s", u2fs_strerror(s_rc))); + if (cfg->debug) + D(("Unable to set origin: %s", u2fs_strerror(s_rc))); return retval; } if ((s_rc = u2fs_set_appid(ctx, cfg->appid)) != U2FS_OK) { - D(("Unable to set appid: %s", u2fs_strerror(s_rc))); + if (cfg->debug) + D(("Unable to set appid: %s", u2fs_strerror(s_rc))); return retval; } @@ -269,18 +264,21 @@ D(("Attempting authentication with device number %d", i + 1)); if ((s_rc = u2fs_set_keyHandle(ctx, devices[i].keyHandle)) != U2FS_OK) { - D(("Unable to set keyHandle: %s", u2fs_strerror(s_rc))); + if (cfg->debug) + D(("Unable to set keyHandle: %s", u2fs_strerror(s_rc))); return retval; } if ((s_rc = u2fs_set_publicKey(ctx, devices[i].publicKey)) != U2FS_OK) { - D(("Unable to set publicKey %s", u2fs_strerror(s_rc))); + if (cfg->debug) + D(("Unable to set publicKey %s", u2fs_strerror(s_rc))); return retval; } if ((s_rc = u2fs_authentication_challenge(ctx, &buf)) != U2FS_OK) { - D(("Unable to produce authentication challenge: %s", - u2fs_strerror(s_rc))); + if (cfg->debug) + D(("Unable to produce authentication challenge: %s", + u2fs_strerror(s_rc))); return retval; } @@ -309,7 +307,8 @@ i++; if (u2fh_devs_discover(devs, &max_index) != U2FH_OK) { - D(("Unable to discover devices")); + if (cfg->debug) + D(("Unable to discover devices")); return retval; } @@ -347,24 +346,28 @@ unsigned i = 0; if (u2fs_global_init(0) != U2FS_OK) { - D(("Unable to initialize libu2f-server")); + if (cfg->debug) + D(("Unable to initialize libu2f-server")); return retval; } for (i = 0; i < n_devs; ++i) { if (u2fs_init(ctx_arr + i) != U2FS_OK) { - D(("Unable to initialize libu2f-server")); + if (cfg->debug) + D(("Unable to initialize libu2f-server")); return retval; } if ((s_rc = u2fs_set_origin(ctx_arr[i], cfg->origin)) != U2FS_OK) { - D(("Unable to set origin: %s", u2fs_strerror(s_rc))); + if (cfg->debug) + D(("Unable to set origin: %s", u2fs_strerror(s_rc))); return retval; } if ((s_rc = u2fs_set_appid(ctx_arr[i], cfg->appid)) != U2FS_OK) { - D(("Unable to set appid: %s", u2fs_strerror(s_rc))); + if (cfg->debug) + D(("Unable to set appid: %s", u2fs_strerror(s_rc))); return retval; } @@ -374,21 +377,24 @@ if ((s_rc = u2fs_set_keyHandle(ctx_arr[i], devices[i].keyHandle)) != U2FS_OK) { - D(("Unable to set keyHandle: %s", u2fs_strerror(s_rc))); + if (cfg->debug) + D(("Unable to set keyHandle: %s", u2fs_strerror(s_rc))); return retval; } if ((s_rc = u2fs_set_publicKey(ctx_arr[i], devices[i].publicKey)) != U2FS_OK) { - D(("Unable to set publicKey %s", u2fs_strerror(s_rc))); + if (cfg->debug) + D(("Unable to set publicKey %s", u2fs_strerror(s_rc))); return retval; } if ((s_rc = u2fs_authentication_challenge(ctx_arr[i], &buf)) != U2FS_OK) { - D(("Unable to produce authentication challenge: %s", - u2fs_strerror(s_rc))); + if (cfg->debug) + D(("Unable to produce authentication challenge: %s", + u2fs_strerror(s_rc))); return retval; }
