Hello community,

here is the log from the commit of package pam_u2f for openSUSE:Factory checked 
in at 2015-11-11 10:31:55
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/pam_u2f (Old)
 and      /work/SRC/openSUSE:Factory/.pam_u2f.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "pam_u2f"

Changes:
--------
--- /work/SRC/openSUSE:Factory/pam_u2f/pam_u2f.changes  2015-10-14 
16:44:32.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.pam_u2f.new/pam_u2f.changes     2015-11-11 
10:36:12.000000000 +0100
@@ -1,0 +2,7 @@
+Fri Nov  6 22:00:05 UTC 2015 - [email protected]
+
+- Version 1.0.3 (released 2015-11-02)
+  - Bugfix in pamu2fcfg.
+  - Minor improvements for verbose mode in pamu2fcfg. 
+
+-------------------------------------------------------------------

Old:
----
  pam_u2f-1.0.2.tar.gz
  pam_u2f-1.0.2.tar.gz.sig

New:
----
  pam_u2f-1.0.3.tar.gz
  pam_u2f-1.0.3.tar.gz.sig

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ pam_u2f.spec ++++++
--- /var/tmp/diff_new_pack.DptWSy/_old  2015-11-11 10:36:12.000000000 +0100
+++ /var/tmp/diff_new_pack.DptWSy/_new  2015-11-11 10:36:12.000000000 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           pam_u2f
-Version:        1.0.2
+Version:        1.0.3
 Release:        0
 Summary:        Allows you to use U2F to authenticate against PAM
 License:        BSD-2-Clause

++++++ pam_u2f-1.0.2.tar.gz -> pam_u2f-1.0.3.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/pam_u2f-1.0.2/ChangeLog new/pam_u2f-1.0.3/ChangeLog
--- old/pam_u2f-1.0.2/ChangeLog 2015-10-06 13:57:12.000000000 +0200
+++ new/pam_u2f-1.0.3/ChangeLog 2015-11-02 15:36:55.000000000 +0100
@@ -1,3 +1,20 @@
+2015-11-01  Alessio Di Mauro <[email protected]>
+
+       * pamu2fcfg/pamu2fcfg.c: Check the correct return value in
+       pamu2fcfg.
+
+2015-10-20  Alessio Di Mauro <[email protected]>
+
+       * : Merge pull request #24 from astronouth7303/patch-1 Properly tag 
`perror()` call for `getlogin()`.
+
+2015-10-07  Alessio Di Mauro <[email protected]>
+
+       * util.c: Tie messages to debug flag more.
+
+2015-10-06  Alessio Di Mauro <[email protected]>
+
+       * NEWS, configure.ac: Bump versions.
+
 2015-10-06  Alessio Di Mauro <[email protected]>
 
        * NEWS: Version 1.0.2.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/pam_u2f-1.0.2/NEWS new/pam_u2f-1.0.3/NEWS
--- old/pam_u2f-1.0.2/NEWS      2015-10-06 13:53:53.000000000 +0200
+++ new/pam_u2f-1.0.3/NEWS      2015-11-02 15:34:38.000000000 +0100
@@ -2,6 +2,10 @@
 
 pam-u2f NEWS -- History of user-visible changes.          -*- outline -*-
 
+* Version 1.0.3 (released 2015-11-02)
+ ** Bugfix in pamu2fcfg.
+ ** Minor improvements for verbose mode in pamu2fcfg.
+
 * Version 1.0.2 (released 2015-10-06)
  ** Changes to automake flags.
  ** Improve build on OS X.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/pam_u2f-1.0.2/configure new/pam_u2f-1.0.3/configure
--- old/pam_u2f-1.0.2/configure 2015-06-30 17:23:54.000000000 +0200
+++ new/pam_u2f-1.0.3/configure 2015-10-06 14:02:22.000000000 +0200
@@ -1,6 +1,6 @@
 #! /bin/sh
 # Guess values for system-dependent variables and create Makefiles.
-# Generated by GNU Autoconf 2.69 for pam_u2f 1.0.2.
+# Generated by GNU Autoconf 2.69 for pam_u2f 1.0.3.
 #
 # Report bugs to <[email protected]>.
 #
@@ -590,8 +590,8 @@
 # Identity of this package.
 PACKAGE_NAME='pam_u2f'
 PACKAGE_TARNAME='pam_u2f'
-PACKAGE_VERSION='1.0.2'
-PACKAGE_STRING='pam_u2f 1.0.2'
+PACKAGE_VERSION='1.0.3'
+PACKAGE_STRING='pam_u2f 1.0.3'
 PACKAGE_BUGREPORT='[email protected]'
 PACKAGE_URL=''
 
@@ -1329,7 +1329,7 @@
   # Omit some internal or obsolete options to make the list less imposing.
   # This message is too long to be a string in the A/UX 3.1 sh.
   cat <<_ACEOF
-\`configure' configures pam_u2f 1.0.2 to adapt to many kinds of systems.
+\`configure' configures pam_u2f 1.0.3 to adapt to many kinds of systems.
 
 Usage: $0 [OPTION]... [VAR=VALUE]...
 
@@ -1399,7 +1399,7 @@
 
 if test -n "$ac_init_help"; then
   case $ac_init_help in
-     short | recursive ) echo "Configuration of pam_u2f 1.0.2:";;
+     short | recursive ) echo "Configuration of pam_u2f 1.0.3:";;
    esac
   cat <<\_ACEOF
 
@@ -1520,7 +1520,7 @@
 test -n "$ac_init_help" && exit $ac_status
 if $ac_init_version; then
   cat <<\_ACEOF
-pam_u2f configure 1.0.2
+pam_u2f configure 1.0.3
 generated by GNU Autoconf 2.69
 
 Copyright (C) 2012 Free Software Foundation, Inc.
@@ -1889,7 +1889,7 @@
 This file contains any messages produced by compilers while
 running configure, to aid debugging if configure makes a mistake.
 
-It was created by pam_u2f $as_me 1.0.2, which was
+It was created by pam_u2f $as_me 1.0.3, which was
 generated by GNU Autoconf 2.69.  Invocation command line was
 
   $ $0 $@
@@ -2753,7 +2753,7 @@
 
 # Define the identity of the package.
  PACKAGE='pam_u2f'
- VERSION='1.0.2'
+ VERSION='1.0.3'
 
 
 cat >>confdefs.h <<_ACEOF
@@ -13248,7 +13248,7 @@
 # report actual input values of CONFIG_FILES etc. instead of their
 # values after options handling.
 ac_log="
-This file was extended by pam_u2f $as_me 1.0.2, which was
+This file was extended by pam_u2f $as_me 1.0.3, which was
 generated by GNU Autoconf 2.69.  Invocation command line was
 
   CONFIG_FILES    = $CONFIG_FILES
@@ -13305,7 +13305,7 @@
 cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1
 ac_cs_config="`$as_echo "$ac_configure_args" | sed 's/^ //; 
s/[\\""\`\$]/\\\\&/g'`"
 ac_cs_version="\\
-pam_u2f config.status 1.0.2
+pam_u2f config.status 1.0.3
 configured by $0, generated by GNU Autoconf 2.69,
   with options \\"\$ac_cs_config\\"
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/pam_u2f-1.0.2/configure.ac 
new/pam_u2f-1.0.3/configure.ac
--- old/pam_u2f-1.0.2/configure.ac      2015-06-18 10:26:31.000000000 +0200
+++ new/pam_u2f-1.0.3/configure.ac      2015-10-06 14:01:57.000000000 +0200
@@ -1,7 +1,7 @@
 #  Copyright (C) 2014-2015 Yubico AB - See COPYING
 #
 
-AC_INIT([pam_u2f], [1.0.2], [[email protected]])
+AC_INIT([pam_u2f], [1.0.3], [[email protected]])
 AC_CONFIG_AUX_DIR([build-aux])
 AC_CONFIG_MACRO_DIR([m4])
 AM_INIT_AUTOMAKE([1.11 foreign -Wall -Werror])
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/pam_u2f-1.0.2/man/pam_u2f.8 
new/pam_u2f-1.0.3/man/pam_u2f.8
--- old/pam_u2f-1.0.2/man/pam_u2f.8     2015-07-10 20:08:09.000000000 +0200
+++ new/pam_u2f-1.0.3/man/pam_u2f.8     2015-10-06 14:04:54.000000000 +0200
@@ -2,12 +2,12 @@
 .\"     Title: pam_u2f
 .\"    Author: [FIXME: author] [see http://docbook.sf.net/el/author]
 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
-.\"      Date: Version 1.0.2
+.\"      Date: Version 1.0.3
 .\"    Manual: PAM U2F Module Manual
 .\"    Source: pam-u2f
 .\"  Language: English
 .\"
-.TH "PAM_U2F" "8" "Version 1\&.0\&.2" "pam\-u2f" "PAM U2F Module Manual"
+.TH "PAM_U2F" "8" "Version 1\&.0\&.3" "pam\-u2f" "PAM U2F Module Manual"
 .\" -----------------------------------------------------------------
 .\" * Define some portability stuff
 .\" -----------------------------------------------------------------
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/pam_u2f-1.0.2/man/pamu2fcfg.1 
new/pam_u2f-1.0.3/man/pamu2fcfg.1
--- old/pam_u2f-1.0.2/man/pamu2fcfg.1   2015-07-10 20:08:10.000000000 +0200
+++ new/pam_u2f-1.0.3/man/pamu2fcfg.1   2015-10-06 14:04:55.000000000 +0200
@@ -2,12 +2,12 @@
 .\"     Title: pamu2fcfg
 .\"    Author: [FIXME: author] [see http://docbook.sf.net/el/author]
 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
-.\"      Date: Version 1.0.2
+.\"      Date: Version 1.0.3
 .\"    Manual: PAM U2F Configuration Tool
 .\"    Source: pamu2fcfg
 .\"  Language: English
 .\"
-.TH "PAMU2FCFG" "1" "Version 1\&.0\&.2" "pamu2fcfg" "PAM U2F Configuration 
Tool"
+.TH "PAMU2FCFG" "1" "Version 1\&.0\&.3" "pamu2fcfg" "PAM U2F Configuration 
Tool"
 .\" -----------------------------------------------------------------
 .\" * Define some portability stuff
 .\" -----------------------------------------------------------------
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/pam_u2f-1.0.2/pamu2fcfg/pamu2fcfg.c 
new/pam_u2f-1.0.3/pamu2fcfg/pamu2fcfg.c
--- old/pam_u2f-1.0.2/pamu2fcfg/pamu2fcfg.c     2015-07-10 20:06:57.000000000 
+0200
+++ new/pam_u2f-1.0.3/pamu2fcfg/pamu2fcfg.c     2015-11-01 17:20:12.000000000 
+0100
@@ -109,20 +109,20 @@
   else {
     user = getlogin();
     if (!user) {
-      perror("gethostname");
+      perror("getlogin");
       exit(EXIT_FAILURE);
     }
   }
 
   if (u2fh_global_init(args_info.debug_flag ? U2FS_DEBUG : 0) != U2FH_OK
       || u2fh_devs_init(&devs) != U2FH_OK) {
-    fprintf(stderr, "Unable to initialize libu2f-host");
+    fprintf(stderr, "Unable to initialize libu2f-host\n");
     exit(EXIT_FAILURE);
   }
 
   h_rc = u2fh_devs_discover(devs, &max_index);
   if (h_rc != U2FH_OK && h_rc != U2FH_NO_U2F_DEVICE) {
-    fprintf(stderr, "Unable to discover device(s), %s (%d)",
+    fprintf(stderr, "Unable to discover device(s), %s (%d)\n",
             u2fh_strerror(h_rc), h_rc);
     exit(EXIT_FAILURE);
   }
@@ -157,7 +157,7 @@
 
   s_rc = u2fs_registration_challenge(ctx, &p);
   if (s_rc != U2FS_OK) {
-    fprintf(stderr, "Unable to generate registration challenge, %s (%d)",
+    fprintf(stderr, "Unable to generate registration challenge, %s (%d)\n",
             u2fs_strerror(s_rc), s_rc);
     exit(EXIT_FAILURE);
   }
@@ -165,9 +165,9 @@
   h_rc =
       u2fh_register(devs, p, origin, &response,
                     U2FH_REQUEST_USER_PRESENCE);
-  if (s_rc != U2FS_OK) {
-    fprintf(stderr, "Unable to generate registration challenge, %s (%d)",
-            u2fs_strerror(s_rc), s_rc);
+  if (h_rc != U2FS_OK) {
+    fprintf(stderr, "Unable to generate registration challenge, %s (%d)\n",
+            u2fh_strerror(h_rc), h_rc);
     exit(EXIT_FAILURE);
   }
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/pam_u2f-1.0.2/util.c new/pam_u2f-1.0.3/util.c
--- old/pam_u2f-1.0.2/util.c    2015-10-05 16:13:37.000000000 +0200
+++ new/pam_u2f-1.0.3/util.c    2015-10-07 10:23:25.000000000 +0200
@@ -102,16 +102,6 @@
           break;
         }
 
-        /*if (!s_token) { // Check not needed, s_token can never be NULL
-          if (verbose)
-            D(("Unable to retrieve keyHandle number %d", i + 1));
-          fclose(opwfile);
-          *n_devs = 0;
-          free(buf);
-          buf = NULL;
-          return retval;
-          }*/
-
         if (verbose)
           D(("KeyHandle for device number %d: %s", i + 1, s_token));
 
@@ -228,12 +218,14 @@
   unsigned max_index_prev = 0;
 
   if (u2fh_global_init(0) != U2FH_OK || u2fh_devs_init(&devs) != U2FH_OK) {
-    D(("Unable to initialize libu2f-host"));
+    if (cfg->debug)
+      D(("Unable to initialize libu2f-host"));
     return retval;
   }
 
   if ((h_rc = u2fh_devs_discover(devs, &max_index)) != U2FH_OK) {
-    D(("Unable to discover device(s), %s", u2fh_strerror(h_rc)));
+    if (cfg->debug)
+      D(("Unable to discover device(s), %s", u2fh_strerror(h_rc)));
     return retval;
   } else if (cfg->manual == 0) {
     if (cfg->cue) {
@@ -246,17 +238,20 @@
     D(("Device max index is %u", max_index));
 
   if (u2fs_global_init(0) != U2FS_OK || u2fs_init(&ctx) != U2FS_OK) {
-    D(("Unable to initialize libu2f-server"));
+    if (cfg->debug)
+      D(("Unable to initialize libu2f-server"));
     return retval;
   }
 
   if ((s_rc = u2fs_set_origin(ctx, cfg->origin)) != U2FS_OK) {
-    D(("Unable to set origin: %s", u2fs_strerror(s_rc)));
+    if (cfg->debug)
+      D(("Unable to set origin: %s", u2fs_strerror(s_rc)));
     return retval;
   }
 
   if ((s_rc = u2fs_set_appid(ctx, cfg->appid)) != U2FS_OK) {
-    D(("Unable to set appid: %s", u2fs_strerror(s_rc)));
+    if (cfg->debug)
+      D(("Unable to set appid: %s", u2fs_strerror(s_rc)));
     return retval;
   }
 
@@ -269,18 +264,21 @@
       D(("Attempting authentication with device number %d", i + 1));
 
     if ((s_rc = u2fs_set_keyHandle(ctx, devices[i].keyHandle)) != U2FS_OK) {
-      D(("Unable to set keyHandle: %s", u2fs_strerror(s_rc)));
+      if (cfg->debug)
+        D(("Unable to set keyHandle: %s", u2fs_strerror(s_rc)));
       return retval;
     }
 
     if ((s_rc = u2fs_set_publicKey(ctx, devices[i].publicKey)) != U2FS_OK) {
-      D(("Unable to set publicKey %s", u2fs_strerror(s_rc)));
+      if (cfg->debug)
+        D(("Unable to set publicKey %s", u2fs_strerror(s_rc)));
       return retval;
     }
 
     if ((s_rc = u2fs_authentication_challenge(ctx, &buf)) != U2FS_OK) {
-      D(("Unable to produce authentication challenge: %s",
-         u2fs_strerror(s_rc)));
+      if (cfg->debug)
+        D(("Unable to produce authentication challenge: %s",
+           u2fs_strerror(s_rc)));
       return retval;
     }
 
@@ -309,7 +307,8 @@
     i++;
 
     if (u2fh_devs_discover(devs, &max_index) != U2FH_OK) {
-      D(("Unable to discover devices"));
+      if (cfg->debug)
+        D(("Unable to discover devices"));
       return retval;
     }
 
@@ -347,24 +346,28 @@
   unsigned i = 0;
 
   if (u2fs_global_init(0) != U2FS_OK) {
-    D(("Unable to initialize libu2f-server"));
+    if (cfg->debug)
+      D(("Unable to initialize libu2f-server"));
     return retval;
   }
 
   for (i = 0; i < n_devs; ++i) {
 
     if (u2fs_init(ctx_arr + i) != U2FS_OK) {
-      D(("Unable to initialize libu2f-server"));
+      if (cfg->debug)
+        D(("Unable to initialize libu2f-server"));
       return retval;
     }
 
     if ((s_rc = u2fs_set_origin(ctx_arr[i], cfg->origin)) != U2FS_OK) {
-      D(("Unable to set origin: %s", u2fs_strerror(s_rc)));
+      if (cfg->debug)
+        D(("Unable to set origin: %s", u2fs_strerror(s_rc)));
       return retval;
     }
 
     if ((s_rc = u2fs_set_appid(ctx_arr[i], cfg->appid)) != U2FS_OK) {
-      D(("Unable to set appid: %s", u2fs_strerror(s_rc)));
+      if (cfg->debug)
+        D(("Unable to set appid: %s", u2fs_strerror(s_rc)));
       return retval;
     }
 
@@ -374,21 +377,24 @@
     if ((s_rc =
          u2fs_set_keyHandle(ctx_arr[i],
                             devices[i].keyHandle)) != U2FS_OK) {
-      D(("Unable to set keyHandle: %s", u2fs_strerror(s_rc)));
+      if (cfg->debug)
+        D(("Unable to set keyHandle: %s", u2fs_strerror(s_rc)));
       return retval;
     }
 
     if ((s_rc =
          u2fs_set_publicKey(ctx_arr[i],
                             devices[i].publicKey)) != U2FS_OK) {
-      D(("Unable to set publicKey %s", u2fs_strerror(s_rc)));
+      if (cfg->debug)
+        D(("Unable to set publicKey %s", u2fs_strerror(s_rc)));
       return retval;
     }
 
     if ((s_rc =
          u2fs_authentication_challenge(ctx_arr[i], &buf)) != U2FS_OK) {
-      D(("Unable to produce authentication challenge: %s",
-         u2fs_strerror(s_rc)));
+      if (cfg->debug)
+        D(("Unable to produce authentication challenge: %s",
+           u2fs_strerror(s_rc)));
       return retval;
     }
 


Reply via email to