libykpiv-devel-1.6.2-4.30 >  A \tp9|,ܪqK7|@Max~!fww dl?mlp>$?$d  U 5Utz     Xt (.889:WF!G!H!I!X!Y"\"]"0^"cb"c#Pd#e#f#l#u#v#w$x$(y$<z$H$X$\$b$Clibykpiv-devel1.6.24.30Development files for the Yubikey NEO PIV applet libraryThis package contains the header file needed to develop applications that use Yubikey NEO PIV applet library.\tecentriq5o`SUSE Linux Enterprise 15SUSE LLC BSD-2-Clausehttps://www.suse.com/Development/Libraries/C and C++https://developers.yubico.com/linuxaarch64 ]W_A큤\tc\t\Zr\tc\t\6514cf90ae980849bc1fde1d9eccb7570b50f897c0d98372a39c04010458168db8e8040d6d8efd1da0b3503df7c774bec5b9af1333db0e3326eeb9c7bc95f273e04b44e7b937ae42a220551d4008bf6756a8ca6aa03c92a1d22cefe03368e942libykpiv.so.1.4.4rootrootrootrootrootrootrootrootrootrootyubico-piv-tool-1.6.2-4.30.src.rpmlibykpiv-devellibykpiv-devel(aarch-64)pkgconfig(ykpiv)@@    /usr/bin/pkg-configlibykpiv1pkgconfig(libcrypto)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.6.23.0.4-14.6.0-14.0-15.2-14.14.1[[@[9@ZZ ,@Y, @WQW;WVjVLh@VD@V<@V@V @U@U@UU>$UTء@Tи@T7jengelh@inai.dekbabioch@suse.comkbabioch@suse.comt.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.decdenicolo@suse.comt.gruner@katodev.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.de- Rename %soname to %sover to better reflect its use. - Fix RPM groups.- Version 1.6.2 (released 2018-09-14) - Compare reader names case insensitive - Fix certificate and certificate request signatures with OpenSSL 1.1- Version 1.6.1 (released 2018-08-17) - Compilation warning fixes for OpenSSL 1.1 builds - Fix length when encoding exactly 0xff bytes - Check length of objects correctly before storing in buffer - Check length of certificate correctly when storing - Version 1.6.0 (released 2018-08-08) - Security release to mitigate YSA-2018-03 (YSA-2018-03, CVE-2018-14779, CVE-2018-14780, bsc#1104809, bsc#1104811) - Allow building against LibreSSL - Bugfixes in OpenSSL 1.1 code - Fix compilation warnings - Fix ykcs11 key generation to work with OpenSSL 1.1 - Ykcs11 compatibility fixes - Make use of %license macro instead of %doc for COPYING - Applied spec-cleaner- Version 1.5.0 (released 2017-11-29) - API additions: Higher-level "util" API added to libykpiv. - Added ykpiv_attest(), ykpiv_get_pin_retries(), ykpiv_set_pin_retries() - Added functions for using existing PCSC card handle. - Support using custom memory allocator. - Documentation updates. make doxygen for HTML format. - Expanded automated tests for hardware devices, moved to make hwcheck. - OpenSSL 1.1 support - Moderate internal refactoring. Many small bugs fixed.- Version 1.4.4 (released 2017-10-17) - Documentation updates. - Add pin caching to work around disconnect problems. - Disable RSA key generation on YubiKey 4 before 4.3.5. See https://yubi.co/ysa201701/ for details.- Version 1.4.3 (released 2017-04-18) - Encode RSA x509 certificates correctly. - Documentation updates. - In ykcs11 return CKA_MODULUS correctly for private keys. - In ykcs11 fix for signature size approximation. - Fix PSS signatures in ykcs11. - Add a CLI flag --stdin-input to make batch execution easier.- Version 1.4.2 (released 2016-08-12) - Clarify license headers and clean up YKCS11 licensing. Now uses pkcs11.h from the Scute project. - Don’t install ykcs11-version.h. - No cflags in ykcs11.pc. - Unimplemented YKCS11 functions now return CKR_FUNCTION_FAILED. - Version 1.4.1 (released 2016-08-11) - Documentation updates - Add possibility to export certificates in SSH format. - Make certificate serial number random by default.- Version 1.4.0 (released 2016-05-03) - Add attest action When used on a slot with a generated key, outputs a signed x509 certificate for that slot showing that the key was generated in hardware. Available in firmware 4.3.0 and newer. - Add cached parameter for touch-policy With cached, the touch is valid for an additional 15s. Available in firmware 4.3.0 and newer. - Enforce a minimum PIN length of 6 characters. - Fix a bug with list-readers action where it fell through processing into write-object.- Version 1.3.1 (released 2016-04-19) - Fix a bug where unblock pin would instead change puk, introduced in 1.3.0. - Clarifications with help texts. - Version 1.3.0 (released 2016-02-19) - Fixed extraction of RSA modulus and exponent for pkcs11. - Implemented C_SetPIN for pkcs11. - Add generic write and read object actions for the tool. Supports hex/binary/base64 formats - Add ykpiv_change_pin(), ykpiv_change_puk() and ykpiv_unblock_pin() - Print CCC with status action. - Address bugs with pkcs11 on windows. - Add --valid-days and --serial to tool for selfsign-certificate action. - Ask for password for pkcs12 if none is given.- Version 1.2.2 (released 2015-12-08) - Fix old buffer overflow in change-pin functionality. - Version 1.2.1 (released 2015-12-08) - Fix issue with big certificates and status. - Version 1.2.0 (released 2015-12-07) - On OSX use @loader_path instead of @executable_path for ykcs11. - Add ykpiv_import_private_key to libykpiv. - Raise buffer sizes to support bigger objects. - Change behavior of action status, only list populated slots. - Add retired keys to ykcs11. - In ykcs11 support login with non null terminated pin. - Add a new action set-ccc to yubico-piv-tool to set the CCC.- Version 1.1.2 (released 2015-11-13) - Properly handle DER encoding in ECDSA signatures.- Version 1.1.1 (released 2015-11-11) - Make sure SCardContext is properly acquired and released.- Version 1.1.0 (released 2015-11-06) - Add support for new YubiKey 4. - Add ykcs11.- Add dependencive in .spec file- Version 1.0.3 (released 2015-10-01) - Correct wording on unblock-pin action. - Show pin retries correctly. - Use a bigger buffer for receiving data.- Version 1.0.2 (released 2015-09-04) - Query for different passwords/pins on stdin if they’re not supplied. - If a reader fails continue trying matching readers. - Authentication failed is supposed to be 0x63cX not 0x630X.- Version 1.0.1 (released 2015-07-10) - Project relicensed to 2-clause BSD license - Minor fixes found with clang scan-build- Version 1.0.0 (released 2015-06-23) - Add a test-decipher action. - Check that e is 0x10001 on importing rsa keys - Use PCSC transactions when sending and receiving data- license update: GPL-3.0+ COPYING files says package is under GPL-3.0+.- Version 0.1.6 (released 2015-03-23) Add a read-certificate action to the tool. Add a status action to the tool. Fix a library bug so NULL can be passed to ykpiv_verify() Add a test-signature action to the tool.- Version 0.1.5 (released 2015-02-04) Revert the check for parity and just set parity before the weak check.- Version 0.1.4 (released 2015-02-02) Prompt for input if input is stdin. Mark all bits of the signature as used is certs and requests. Correct error for unblock-pin. Fix hex decode to decode capital letters and return error. Check parity of new management keys.- Version 0.1.3 (released 2014-12-18) Add format DER for importing certificates. Make sure diagnostic feedback ends up on stderr. Add positive feedback for a couple of actions. - Version 0.1.2 (released 2014-11-14) Fix an issue where shorter component of RSA keys where not packed correctly. - Version 0.1.1 (released 2014-11-10) Correct broken CHUID that made windows work inconsistently. Add support for compressed certificates. Fix broken unblock-pin action. Don’t try to accept to short keys for mgm key. Only do applet authentication if needed. Add --hash for selecting what hash to use for signatures. Add hidden --sign command. Should probably not be used. Fix for signature algorithm in selfsigned cert. - Version 0.1.0 (released 2014-08-25) Break out functionality into a library. More testing. - Version 0.0.3 (released 2014-05-26) Add delete-certificate action. Fix minor bugs. - Version 0.0.2 (released 2014-02-19) Fix an offset bug with CHUID. Do full mutual auth with the applet. - Version 0.0.1 (released 2014-02-11) Initial release.centriq5 15570340851.6.2-4.301.6.2-4.301.6.2ykpivykpiv-version.hykpiv.hlibykpiv.soykpiv.pc/usr/include//usr/include/ykpiv//usr/lib64//usr/lib64/pkgconfig/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:SLE-15-SP1:GA/standard/1c5a54f30e549d046cc97768e034b679-yubico-piv-toolcpioxz5aarch64-suse-linuxdirectoryC source, ASCII textpkgconfig filePRRXؚmaV[:utf-85cd76617470152cc6b7fa90a157fbc19f8fc01b2bc3550f23cec9b0e5794ecc0? 7zXZ !t/rk] crt:bLL krdJq1k'Pqr7lU#P`l葼&"7˗k;uE#A[(/g3,Ž? p[/6d]v_<6BiGjLHr=h^8fy<;HuX@?mOM!--xYjׂes\h#4t"5ɠ#M%~/iSJ>"~3u>),;Eg S Us{1OU| Nx (Kol+,57%C ;Z\tń$aU1@D,_[c[eyRBoޚ¹ [ 1umyta ZK7*o؟*pJ DQ '2uNu $"U8Ɯ7zh7Kaxd`+/%-|.fɍ ?7 \> FP%ˎCt[_ /ǖ+TtV(Dk| 2>3 n\k<+Lr Xh#S3q}qܥz:Fò1zWi.g(mAd(*j 2\&ж򍠝pOK Av'N$8F+u!N̢R$WD3'Js⹆ TGn1o?&ðHjBkUwQjvUV0]q w3(j]QwaD;`f Wu3ղ٦0oJaދ$ OQm Xa]/A`OT@7 w{ /uAkiw $UΌhŦoET>'=y:$QX+JaS׳}N6"8z|,ǝ *)IJv$2Ԯw9,+Fd$SKinYk5$W 2ʾ">1^J;sqEъL6:AT,}D 9 ϞC`]7uZ r_?W DvۃLh]XuLzJѰ~^TQVZjGDF.]W *Ii s o.CĽZ>5{V =AXd>a1&' ,k*Ku!:x#$\IVGy|^S+9M XN&aBBQ\Ncȫٖ4bf\{2 *Tz;` d^XM[$d l`0!*7P.%p5W#ڨraUiYVc2*$NpkCb#gt ‡XSxI>b2[5+43} xRF Vm\;XK9Z&*mւC 9PeR2"qƍT^Ä(sЃ3?_=hAG$A w e?O`qjF3t 8T=AwhPO>i985E݇G/u2fkT/ĔTTaGkTAaIcDeF՚ּ>YFO3x?w^{ ~AŘfw:|*[[P@PWP~Q[]@h6lz2 *֊cOBzs*}DI0guނxrqE*6-k4ćaSFh>лSFW;%o;+ڌ$w߼a">^0 H5]Q$?hjN,f\ SE~T6Ay@󕺍ip3z#{@0(lx6n Z}}U.Xq(*N&s)2fc}:)oL M+T&G@kЊf\%IyB-K,Ԛ,gFLʭtS+d#DM' W9-K`^Ac)}ezZdX#aP! Aklt>F)<nYUB+(p GI* wul\o}eW΀QpcYK=?HE/cl4q_8DċP1+R*G r 6I ~GbVL#l&f7a~z*Iʣl&glR2@ 24! $7Z>#D$]Cs0Ǐ(QT4 րr9WxvKS5M"ʵvBsbo0,c˴OM\>iݨt&fdʨkQ9n bT/)9V5Is7~E`Y[˖ )[1٨nr~NTb` M7DYS@#o2gr[L(5)eה9k٥ջ-Ak3EϚ7>!`b Ög@iyS2=Z$\AWooG1FID)ETARښNd3%dۓ$Q3[[&5f%r ۖ?W@`+08H{E,QES.3C@7 Q^k=aXbw3FD]_X'b!PtM35cX~𭊠{+d6s)_$k~==Z$__,H`HYX$! ,wI4)1 㿙ɎDʠ5-gk|CѓE+ʧ4ڏ