diff options
author | Ulrich Müller <ulm@gentoo.org> | 2007-12-25 19:56:53 +0000 |
---|---|---|
committer | Ulrich Müller <ulm@gentoo.org> | 2007-12-25 19:56:53 +0000 |
commit | 540a929c333eae579bb2be2639d757159836a17d (patch) | |
tree | 1f378333ada88d46f85828118bfff19edd78ef24 /app-admin | |
parent | remove app-emulation/virtualbox:alsa (diff) | |
download | historical-540a929c333eae579bb2be2639d757159836a17d.tar.gz historical-540a929c333eae579bb2be2639d757159836a17d.tar.bz2 historical-540a929c333eae579bb2be2639d757159836a17d.zip |
Add myself as maintainer.
Package-Manager: portage-2.1.4_rc11
Diffstat (limited to 'app-admin')
-rw-r--r-- | app-admin/skey/ChangeLog | 5 | ||||
-rw-r--r-- | app-admin/skey/Manifest | 24 | ||||
-rw-r--r-- | app-admin/skey/metadata.xml | 48 |
3 files changed, 40 insertions, 37 deletions
diff --git a/app-admin/skey/ChangeLog b/app-admin/skey/ChangeLog index 755911a45576..6e093004e2a9 100644 --- a/app-admin/skey/ChangeLog +++ b/app-admin/skey/ChangeLog @@ -1,6 +1,9 @@ # ChangeLog for app-admin/skey # Copyright 1999-2007 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/app-admin/skey/ChangeLog,v 1.49 2007/12/25 15:29:38 phreak Exp $ +# $Header: /var/cvsroot/gentoo-x86/app-admin/skey/ChangeLog,v 1.50 2007/12/25 19:56:53 ulm Exp $ + + 25 Dec 2007; Ulrich Mueller <ulm@gentoo.org> metadata.xml: + Add myself as maintainer. 25 Dec 2007; Christian Heim <phreak@gentoo.org> metadata.xml: Removing taviso from metadata.xml as per #202471. Assigning to diff --git a/app-admin/skey/Manifest b/app-admin/skey/Manifest index 5d7034066da6..e81c4d944c8f 100644 --- a/app-admin/skey/Manifest +++ b/app-admin/skey/Manifest @@ -27,14 +27,14 @@ EBUILD skey-1.1.5-r6.ebuild 3141 RMD160 07c8e80adf3e48a891af0939bdf72353c81fa571 MD5 1110e75ce639e9aec02a41928222302f skey-1.1.5-r6.ebuild 3141 RMD160 07c8e80adf3e48a891af0939bdf72353c81fa571 skey-1.1.5-r6.ebuild 3141 SHA256 8928f07418654ac99c2982f1ea03dfc75f6f63c5806b61762486e3dbb3c4370f skey-1.1.5-r6.ebuild 3141 -MISC ChangeLog 6350 RMD160 db88f1f80e6505afe52d8754b0c55f582e4df709 SHA1 5665c408979c8caf7ea5a811ecb1a764ad596d0a SHA256 4435987edc6a03589440ac1e13d832c21e617ba278a6d59bb772edd760ac6367 -MD5 a6a9d2247d41d9c8bf9286f8795270a1 ChangeLog 6350 -RMD160 db88f1f80e6505afe52d8754b0c55f582e4df709 ChangeLog 6350 -SHA256 4435987edc6a03589440ac1e13d832c21e617ba278a6d59bb772edd760ac6367 ChangeLog 6350 -MISC metadata.xml 1458 RMD160 99cf0393cb8a82810961ce272193768f98331a6c SHA1 d0db23be9d930cbdbec30c73770af39d80b44712 SHA256 cc8a52cb6d455e32c9368d8766e9fa3b27689666d84b67e9739cc9982054aab9 -MD5 74d950726bdf9a92498a1e70f2e00c56 metadata.xml 1458 -RMD160 99cf0393cb8a82810961ce272193768f98331a6c metadata.xml 1458 -SHA256 cc8a52cb6d455e32c9368d8766e9fa3b27689666d84b67e9739cc9982054aab9 metadata.xml 1458 +MISC ChangeLog 6437 RMD160 ae239713ad608a5d00ac88640e6feb5df58da4a7 SHA1 3337177a04a185494ac1ba378893da0e070caf6d SHA256 2b99d93eb32564065517669788201c3925032bacdbacf2dbefabbe89766735dd +MD5 f64e67aa68a7444c901c845e7f67c4f0 ChangeLog 6437 +RMD160 ae239713ad608a5d00ac88640e6feb5df58da4a7 ChangeLog 6437 +SHA256 2b99d93eb32564065517669788201c3925032bacdbacf2dbefabbe89766735dd ChangeLog 6437 +MISC metadata.xml 1439 RMD160 e282bf91434f4176ac97ae5b1fb760523ddd5528 SHA1 77c84e46e5703c5617b7f6aef0e4af96fa649a78 SHA256 1bbb0dc3131dc4681e9c1ea71502b289ac236431d5f339171948fa9c4ad29a58 +MD5 2f8629b01a52e425237b99b824b881db metadata.xml 1439 +RMD160 e282bf91434f4176ac97ae5b1fb760523ddd5528 metadata.xml 1439 +SHA256 1bbb0dc3131dc4681e9c1ea71502b289ac236431d5f339171948fa9c4ad29a58 metadata.xml 1439 MD5 e4aa89421b58d537ac5f277164bed323 files/digest-skey-1.1.5-r5 485 RMD160 1233b5e1602a526ae89484f05f1b2819bbb2001c files/digest-skey-1.1.5-r5 485 SHA256 fc26bd411a135df245147e1b2693be6d9ade7cd564cbe06fac2cb6777c33fe1c files/digest-skey-1.1.5-r5 485 @@ -42,9 +42,9 @@ MD5 e4aa89421b58d537ac5f277164bed323 files/digest-skey-1.1.5-r6 485 RMD160 1233b5e1602a526ae89484f05f1b2819bbb2001c files/digest-skey-1.1.5-r6 485 SHA256 fc26bd411a135df245147e1b2693be6d9ade7cd564cbe06fac2cb6777c33fe1c files/digest-skey-1.1.5-r6 485 -----BEGIN PGP SIGNATURE----- -Version: GnuPG v2.0.7 (GNU/Linux) +Version: GnuPG v1.4.8 (GNU/Linux) -iD8DBQFHcSHnyuNVb5qfaOYRAqrQAJwOwNEZf3p+zmTubcgSlHarnc+yWQCgpZ0C -17Gd0w5sxqY7ulhzOCMzN9U= -=gExt +iEYEARECAAYFAkdxYJoACgkQOeoy/oIi7uyzGwCfWEP2pTu2pikhr06CbP7QgIzu +kvEAoM87pBfaznq0riMZDLOeNmaC+4PY +=ISq/ -----END PGP SIGNATURE----- diff --git a/app-admin/skey/metadata.xml b/app-admin/skey/metadata.xml index b69016cc84c8..d98b44f17251 100644 --- a/app-admin/skey/metadata.xml +++ b/app-admin/skey/metadata.xml @@ -1,30 +1,30 @@ <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> <pkgmetadata> - <herd>no-herd</herd> - <maintainer> - <email>maintainer-needed@gentoo.org</email> - </maintainer> - <longdescription lang="en"> - From RFC2289: - One form of attack on networked computing systems is eavesdropping on - network connections to obtain authentication information such as the - login IDs and passwords of legitimate users. Once this information is - captured, it can be used at a later time to gain access to the system. - One-time password systems are designed to counter this type of attack, - called a "replay attack." +<herd>no-herd</herd> +<maintainer> + <email>ulm@gentoo.org</email> +</maintainer> +<longdescription lang="en"> + From RFC2289: + One form of attack on networked computing systems is eavesdropping on + network connections to obtain authentication information such as the + login IDs and passwords of legitimate users. Once this information is + captured, it can be used at a later time to gain access to the system. + One-time password systems are designed to counter this type of attack, + called a "replay attack." - The authentication system described in this document uses a secret - pass-phrase to generate a sequence of one-time (single use) passwords. - With this system, the user's secret pass-phrase never needs to cross the - network at any time such as during authentication or during pass-phrase - changes. Thus, it is not vulnerable to replay attacks. Added security is - provided by the property that no secret information need be stored on - any system, including the server being protected. + The authentication system described in this document uses a secret + pass-phrase to generate a sequence of one-time (single use) passwords. + With this system, the user's secret pass-phrase never needs to cross the + network at any time such as during authentication or during pass-phrase + changes. Thus, it is not vulnerable to replay attacks. Added security + is provided by the property that no secret information need be stored on + any system, including the server being protected. - The OTP system protects against external passive attacks against the - authentication subsystem. It does not prevent a network eavesdropper - from gaining access to private information and does not provide - protection against either "social engineering" or active attacks. - </longdescription> + The OTP system protects against external passive attacks against the + authentication subsystem. It does not prevent a network eavesdropper from + gaining access to private information and does not provide protection + against either "social engineering" or active attacks. +</longdescription> </pkgmetadata> |