summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorUlrich Müller <ulm@gentoo.org>2007-12-25 19:56:53 +0000
committerUlrich Müller <ulm@gentoo.org>2007-12-25 19:56:53 +0000
commit540a929c333eae579bb2be2639d757159836a17d (patch)
tree1f378333ada88d46f85828118bfff19edd78ef24 /app-admin
parentremove app-emulation/virtualbox:alsa (diff)
downloadhistorical-540a929c333eae579bb2be2639d757159836a17d.tar.gz
historical-540a929c333eae579bb2be2639d757159836a17d.tar.bz2
historical-540a929c333eae579bb2be2639d757159836a17d.zip
Add myself as maintainer.
Package-Manager: portage-2.1.4_rc11
Diffstat (limited to 'app-admin')
-rw-r--r--app-admin/skey/ChangeLog5
-rw-r--r--app-admin/skey/Manifest24
-rw-r--r--app-admin/skey/metadata.xml48
3 files changed, 40 insertions, 37 deletions
diff --git a/app-admin/skey/ChangeLog b/app-admin/skey/ChangeLog
index 755911a45576..6e093004e2a9 100644
--- a/app-admin/skey/ChangeLog
+++ b/app-admin/skey/ChangeLog
@@ -1,6 +1,9 @@
# ChangeLog for app-admin/skey
# Copyright 1999-2007 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/app-admin/skey/ChangeLog,v 1.49 2007/12/25 15:29:38 phreak Exp $
+# $Header: /var/cvsroot/gentoo-x86/app-admin/skey/ChangeLog,v 1.50 2007/12/25 19:56:53 ulm Exp $
+
+ 25 Dec 2007; Ulrich Mueller <ulm@gentoo.org> metadata.xml:
+ Add myself as maintainer.
25 Dec 2007; Christian Heim <phreak@gentoo.org> metadata.xml:
Removing taviso from metadata.xml as per #202471. Assigning to
diff --git a/app-admin/skey/Manifest b/app-admin/skey/Manifest
index 5d7034066da6..e81c4d944c8f 100644
--- a/app-admin/skey/Manifest
+++ b/app-admin/skey/Manifest
@@ -27,14 +27,14 @@ EBUILD skey-1.1.5-r6.ebuild 3141 RMD160 07c8e80adf3e48a891af0939bdf72353c81fa571
MD5 1110e75ce639e9aec02a41928222302f skey-1.1.5-r6.ebuild 3141
RMD160 07c8e80adf3e48a891af0939bdf72353c81fa571 skey-1.1.5-r6.ebuild 3141
SHA256 8928f07418654ac99c2982f1ea03dfc75f6f63c5806b61762486e3dbb3c4370f skey-1.1.5-r6.ebuild 3141
-MISC ChangeLog 6350 RMD160 db88f1f80e6505afe52d8754b0c55f582e4df709 SHA1 5665c408979c8caf7ea5a811ecb1a764ad596d0a SHA256 4435987edc6a03589440ac1e13d832c21e617ba278a6d59bb772edd760ac6367
-MD5 a6a9d2247d41d9c8bf9286f8795270a1 ChangeLog 6350
-RMD160 db88f1f80e6505afe52d8754b0c55f582e4df709 ChangeLog 6350
-SHA256 4435987edc6a03589440ac1e13d832c21e617ba278a6d59bb772edd760ac6367 ChangeLog 6350
-MISC metadata.xml 1458 RMD160 99cf0393cb8a82810961ce272193768f98331a6c SHA1 d0db23be9d930cbdbec30c73770af39d80b44712 SHA256 cc8a52cb6d455e32c9368d8766e9fa3b27689666d84b67e9739cc9982054aab9
-MD5 74d950726bdf9a92498a1e70f2e00c56 metadata.xml 1458
-RMD160 99cf0393cb8a82810961ce272193768f98331a6c metadata.xml 1458
-SHA256 cc8a52cb6d455e32c9368d8766e9fa3b27689666d84b67e9739cc9982054aab9 metadata.xml 1458
+MISC ChangeLog 6437 RMD160 ae239713ad608a5d00ac88640e6feb5df58da4a7 SHA1 3337177a04a185494ac1ba378893da0e070caf6d SHA256 2b99d93eb32564065517669788201c3925032bacdbacf2dbefabbe89766735dd
+MD5 f64e67aa68a7444c901c845e7f67c4f0 ChangeLog 6437
+RMD160 ae239713ad608a5d00ac88640e6feb5df58da4a7 ChangeLog 6437
+SHA256 2b99d93eb32564065517669788201c3925032bacdbacf2dbefabbe89766735dd ChangeLog 6437
+MISC metadata.xml 1439 RMD160 e282bf91434f4176ac97ae5b1fb760523ddd5528 SHA1 77c84e46e5703c5617b7f6aef0e4af96fa649a78 SHA256 1bbb0dc3131dc4681e9c1ea71502b289ac236431d5f339171948fa9c4ad29a58
+MD5 2f8629b01a52e425237b99b824b881db metadata.xml 1439
+RMD160 e282bf91434f4176ac97ae5b1fb760523ddd5528 metadata.xml 1439
+SHA256 1bbb0dc3131dc4681e9c1ea71502b289ac236431d5f339171948fa9c4ad29a58 metadata.xml 1439
MD5 e4aa89421b58d537ac5f277164bed323 files/digest-skey-1.1.5-r5 485
RMD160 1233b5e1602a526ae89484f05f1b2819bbb2001c files/digest-skey-1.1.5-r5 485
SHA256 fc26bd411a135df245147e1b2693be6d9ade7cd564cbe06fac2cb6777c33fe1c files/digest-skey-1.1.5-r5 485
@@ -42,9 +42,9 @@ MD5 e4aa89421b58d537ac5f277164bed323 files/digest-skey-1.1.5-r6 485
RMD160 1233b5e1602a526ae89484f05f1b2819bbb2001c files/digest-skey-1.1.5-r6 485
SHA256 fc26bd411a135df245147e1b2693be6d9ade7cd564cbe06fac2cb6777c33fe1c files/digest-skey-1.1.5-r6 485
-----BEGIN PGP SIGNATURE-----
-Version: GnuPG v2.0.7 (GNU/Linux)
+Version: GnuPG v1.4.8 (GNU/Linux)
-iD8DBQFHcSHnyuNVb5qfaOYRAqrQAJwOwNEZf3p+zmTubcgSlHarnc+yWQCgpZ0C
-17Gd0w5sxqY7ulhzOCMzN9U=
-=gExt
+iEYEARECAAYFAkdxYJoACgkQOeoy/oIi7uyzGwCfWEP2pTu2pikhr06CbP7QgIzu
+kvEAoM87pBfaznq0riMZDLOeNmaC+4PY
+=ISq/
-----END PGP SIGNATURE-----
diff --git a/app-admin/skey/metadata.xml b/app-admin/skey/metadata.xml
index b69016cc84c8..d98b44f17251 100644
--- a/app-admin/skey/metadata.xml
+++ b/app-admin/skey/metadata.xml
@@ -1,30 +1,30 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
- <herd>no-herd</herd>
- <maintainer>
- <email>maintainer-needed@gentoo.org</email>
- </maintainer>
- <longdescription lang="en">
- From RFC2289:
- One form of attack on networked computing systems is eavesdropping on
- network connections to obtain authentication information such as the
- login IDs and passwords of legitimate users. Once this information is
- captured, it can be used at a later time to gain access to the system.
- One-time password systems are designed to counter this type of attack,
- called a "replay attack."
+<herd>no-herd</herd>
+<maintainer>
+ <email>ulm@gentoo.org</email>
+</maintainer>
+<longdescription lang="en">
+ From RFC2289:
+ One form of attack on networked computing systems is eavesdropping on
+ network connections to obtain authentication information such as the
+ login IDs and passwords of legitimate users. Once this information is
+ captured, it can be used at a later time to gain access to the system.
+ One-time password systems are designed to counter this type of attack,
+ called a "replay attack."
- The authentication system described in this document uses a secret
- pass-phrase to generate a sequence of one-time (single use) passwords.
- With this system, the user's secret pass-phrase never needs to cross the
- network at any time such as during authentication or during pass-phrase
- changes. Thus, it is not vulnerable to replay attacks. Added security is
- provided by the property that no secret information need be stored on
- any system, including the server being protected.
+ The authentication system described in this document uses a secret
+ pass-phrase to generate a sequence of one-time (single use) passwords.
+ With this system, the user's secret pass-phrase never needs to cross the
+ network at any time such as during authentication or during pass-phrase
+ changes. Thus, it is not vulnerable to replay attacks. Added security
+ is provided by the property that no secret information need be stored on
+ any system, including the server being protected.
- The OTP system protects against external passive attacks against the
- authentication subsystem. It does not prevent a network eavesdropper
- from gaining access to private information and does not provide
- protection against either "social engineering" or active attacks.
- </longdescription>
+ The OTP system protects against external passive attacks against the
+ authentication subsystem. It does not prevent a network eavesdropper from
+ gaining access to private information and does not provide protection
+ against either "social engineering" or active attacks.
+</longdescription>
</pkgmetadata>