libfido2-utils-1.13.0-150400.5.6.1<>,QdI_p9|zn/Z=J7eGdWt+iM+wg)z^.{۵ky#]$3VRg$ΖėY` DoELkOgXF-6#6zՎv0yԹΣ 4 \O, LKHT9"73 S7# kin =?I'ʏ4̲F,kPhB\3U ٖ +M[Oɬb0.~tؗ"bssl)C>A5P?5@d % r )8W]d|    2 8Pn4 *(,84!9!: >!F/ G/H/4I/LX/TY/\\/]/^/b0c0d1>e1Cf1Fl1Hu1\v1tw40x4Hy4` z44445<Clibfido2-utils1.13.0150400.5.6.1Utility programs making use of libfido2, a library for FIDO U2F and FIDO 2.0This package contains utilities to use FIDO U2F and FIDO 2.0 protocols.dI_goat24g:SUSE Linux Enterprise 15SUSE LLC BSD-2-Clausehttps://www.suse.com/Hardware/Otherhttps://developers.yubico.com/linuxx86_64 ف큤dI]dI]dI]dI]dI]dI]b7d5909b78867500a5177d394f01c56376abc78e3463928ef1465fa30a4b6deb3831662f606512e608a70236b2932679122cc731cf16caefffba600caaaa67ae9373a135332801e30fa14bcf9cbc64394004047b6e479af489f2198c879fd9fce3f4b2663bfb508513cb71dba94f98d625b7024e45b4e84d7d1e89d23909a48a9dbe6590f4584108331652d3d24e2a91ace795d2db2ccc874c3dada64cad920e2888f76390cfd75150905768b34837e0f6faa2cc53e3d0677480e1c56659c2a4rootrootrootrootrootrootrootrootrootrootrootrootlibfido2-1.13.0-150400.5.6.1.src.rpmlibfido2-utilslibfido2-utils(x86-64)@@@@@@@@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcbor.so.0()(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libfido2.so.1()(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-1libfido2-0_4_0libfido2-1_0_04.14.3d8cc=qbA@aaaI@a@`z`@_@_X_N7_@^^@^˳@^[]]y@\"\ \\N\|\5@[ @[ @[[[+@[ Z@meissner@suse.commartin.sirringhaus@suse.comsimmphonie@opensuse.orgsimmphonie@opensuse.orgguillaume.gardet@opensuse.orgsimmphonie@opensuse.orgpaolo.perego@suse.compaolo.perego@suse.comrpm@fthiessen.dempluskal@suse.comhpj@suse.comidonmez@suse.comidonmez@suse.comstefan.bruens@rwth-aachen.deidonmez@suse.comidonmez@suse.comidonmez@suse.commrueckert@suse.dekbabioch@suse.desimmphonie@opensuse.orgkbabioch@suse.dejengelh@inai.dekbabioch@suse.dekbabioch@suse.dekbabioch@suse.dekbabioch@suse.dekbabioch@suse.comkbabioch@suse.comt.gruner@katodev.dejengelh@inai.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.de- Use openssl 1.1 still on SLES 15 SP4 to avoid pulling unnecessary openssl-3 dependency. jsc#PED-4521- Version 1.13.0 (2023-02-20) * Support for linking against OpenSSL on Windows; gh#668. * New API calls: + fido_assert_empty_allow_list; + fido_cred_empty_exclude_list. * fido2-token: fix issue when listing large blobs. * Improved support for different fuzzing engines.- Version 1.12.0 (2022-09-22) * Support for COSE_ES384. * Support for hidraw(4) on FreeBSD; gh#597. * Improved support for FIDO 2.1 authenticators. * New API calls: + es384_pk_free; + es384_pk_from_EC_KEY; + es384_pk_from_EVP_PKEY; + es384_pk_from_ptr; + es384_pk_new; + es384_pk_to_EVP_PKEY; + fido_cbor_info_certs_len; + fido_cbor_info_certs_name_ptr; + fido_cbor_info_certs_value_ptr; + fido_cbor_info_maxrpid_minpinlen; + fido_cbor_info_minpinlen; + fido_cbor_info_new_pin_required; + fido_cbor_info_rk_remaining; + fido_cbor_info_uv_attempts; + fido_cbor_info_uv_modality. * Documentation and reliability fixes. - Version 1.11.0 (2022-05-03) * Experimental PCSC support; enable with -DUSE_PCSC. * Improved OpenSSL 3.0 compatibility. * Use RFC1951 raw deflate to compress CTAP 2.1 largeBlobs. * winhello: advertise "uv" instead of "clientPin". * winhello: support hmac-secret in fido_dev_get_assert(). * New API calls: + fido_cbor_info_maxlargeblob. * Documentation and reliability fixes. * Separate build and regress targets.- Version 1.10.0 (2022-01-17) * hid_osx: handle devices with paths > 511 bytes; gh#462. * bio: fix CTAP2 canonical CBOR encoding in fido_bio_dev_enroll_*(); gh#480. * winhello: fallback to GetTopWindow() if GetForegroundWindow() fails. * winhello: fallback to hid_win.c if webauthn.dll isn’t available. * New API calls: - fido_dev_info_set; - fido_dev_io_handle; - fido_dev_new_with_info; - fido_dev_open_with_info. * Cygwin and NetBSD build fixes. * Documentation and reliability fixes. * Support for TPM 2.0 attestation of COSE_ES256 credentials.- Use BuildRequires: openssl-devel instead of forcing 1.1 since 3.x is now supported.- Version 1.9.0 (2021-10-27) * Enabled NFC support on Linux. * Added OpenSSL 3.0 compatibility. * Removed OpenSSL 1.0 compatibility. * Support for FIDO 2.1 "minPinLength" extension. * Support for COSE_EDDSA, COSE_ES256, and COSE_RS1 attestation. * Support for TPM 2.0 attestation. * Support for device timeouts; see fido_dev_set_timeout(). * New API calls: - es256_pk_from_EVP_PKEY; - fido_cred_attstmt_len; - fido_cred_attstmt_ptr; - fido_cred_pin_minlen; - fido_cred_set_attstmt; - fido_cred_set_pin_minlen; - fido_dev_set_pin_minlen_rpid; - fido_dev_set_timeout; - rs256_pk_from_EVP_PKEY. * Reliability and portability fixes. * Better handling of HID devices without identification strings; gh#381. * Fixed detection of Windows’s native webauthn API; gh#382.- Removed fix-cmake-linking.patch because no longer needed- Update to version 1.8.0: * Dropped 'Requires.private' entry from pkg-config file. * Better support for FIDO 2.1 authenticators. * Support for Windows's native webauthn API. * Support for attestation format 'none'. * New API calls: - fido_assert_set_clientdata; - fido_cbor_info_algorithm_cose; - fido_cbor_info_algorithm_count; - fido_cbor_info_algorithm_type; - fido_cbor_info_transports_len; - fido_cbor_info_transports_ptr; - fido_cred_set_clientdata; - fido_cred_set_id; - fido_credman_set_dev_rk; - fido_dev_is_winhello. * fido2-token: new -Sc option to update a resident credential. * Documentation and reliability fixes. * HID access serialisation on Linux. - disable fix-cmake-linking.patch, not needed currently- Update to version 1.7.0: * hid_win: detect devices with vendor or product IDs > 0x7fff * Support for FIDO 2.1 authenticator configuration. * Support for FIDO 2.1 UV token permissions. * Support for FIDO 2.1 "credBlobs" and "largeBlobs" extensions. * New API calls * New fido_init flag to disable fido_dev_open’s U2F fallback * Experimental NFC support on Linux. - Enabled hidapi again, issues related to hidapi are fixed upstream * Added fix-cmake-linking.patch to fix linking- Update to version 1.6.0: * Fix OpenSSL 1.0 and Cygwin builds. * hid_linux: fix build on 32-bit systems. * hid_osx: allow reads from spawned threads. * Documentation and reliability fixes. * New API calls: + fido_cred_authdata_raw_len; + fido_cred_authdata_raw_ptr; + fido_cred_sigcount; + fido_dev_get_uv_retry_count; + fido_dev_supports_credman. * Hardened Windows build. * Native FreeBSD and NetBSD support. * Use CTAP2 canonical CBOR when combining hmac-secret and credProtect. - Drop 7a17a4e9127fb6df6278f19396760e7d60a5862c.patch - Do not build examples as their build fails- Add Conflicts: to supersede version 1.0.0. This is needed for a clean upgrade path on SLE.- Add 7a17a4e9127fb6df6278f19396760e7d60a5862c.patch from upstream to fix 32bit compilation issues.- Update to version 1.5.0 * hid_linux: return FIDO_OK if no devices are found. * hid_osx: + repair communication with U2F tokens, gh#166; + reliability fixes. * fido2-{assert,cred}: new options to explicitly toggle UP, UV. * Support for configurable report lengths. * New API calls: + fido_cbor_info_maxcredcntlst + fido_cbor_info_maxcredidlen + fido_cred_aaguid_len + fido_cred_aaguid_ptr + fido_dev_get_touch_begin + fido_dev_get_touch_status * Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. * Allow CTAP messages up to 2048 bytes; gh#171. * Ensure we only list USB devices by default.- Cleanup udev rules, trying to use the Debian specific plugdev group fills up the journal. - Make the udev rules package noarch, correct Summary- Create a udev subpackage and ship the udev rule- Don't build with hidapi support to fix issues with Yubikey 5Ci https://github.com/Yubico/libfido2/issues/190- Update to version 1.4.0 * hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. * Fall back to U2F if the key claims to, but does not support FIDO2. * FIDO2 credential protection (credprot) support. * New API calls: + fido_cbor_info_fwversion; + fido_cred_prot; + fido_cred_set_prot; + fido_dev_set_transport_functions; + fido_set_log_handler. * Fixed EdDSA and RSA self-attestation.- Version 1.3.1 - fix zero-ing of le1 and le2 when talking to a U2F device. - dropping sk-libfido2 middleware, please find it in the openssh tree.- Version 1.3.0 (2019-11-28) * assert/hmac: encode public key as per spec, gh#60. * fido2-cred: fix creation of resident keys. * fido2-{assert,cred}: support for hmac-secret extension. * hid_osx: detect device removal, gh#56. * hid_osx: fix device detection in MacOS Catalina. * New API calls: - fido_assert_set_authdata_raw; - fido_assert_sigcount; - fido_cred_set_authdata_raw; - fido_dev_cancel. * Middleware library for use by OpenSSH. * Support for biometric enrollment. * Support for OpenBSD. * Support for self-attestation.- Version 1.2.0 (released 2019-07-26) * Credential management support. * New API reflecting FIDO’s 3-state booleans (true, false, absent): - fido_assert_set_up; - fido_assert_set_uv; - fido_cred_set_rk; - fido_cred_set_uv. * Command-line tools for Windows. * Documentation and reliability fixes. * fido_{assert,cred}_set_options() are now marked as deprecated.- Version 1.1.0 (released 2019-05-08) * EdDSA (Ed25519) support. * fido_dev_make_cred: fix order of CBOR map keys. * fido_dev_get_assert: plug memory leak when operating on U2F devices.- Use automatic dependency discovery for libfido2-utils -> libfido2-1_0-0.- Added Conflicts to libfido2-0_4_0 to make sure upgrade goes smoothly as outline in sr#690566- Split utilities into sub-package libfido2-utils and package man pages correctly (bsc#1131163)- Version 1.0.0 (released 2019-03-21) * Native HID support on Linux, MacOS, and Windows. * fido2-{assert,cred}: new -u option to force U2F on dual authenticators. * fido2-assert: support for multiple resident keys with the same RP. * Strict checks for CTAP2 compliance on received CBOR payloads. * Better fuzzing harnesses. * Documentation and reliability fixes.- Version 0.4.0 (released 2019-01-07) * fido2-assert: print the user id for resident credentials. * Fix encoding of COSE algorithms when making a credential. * Rework purpose of fido_cred_set_type; no ABI change. * Minor documentation and code fixes. - Dropped patch that is included upstream now: fix-release-build.patch- Added patch: * fix-release-build.patch: Disables regression tests as proposed by upstream- Applied spec-cleaner- Build package without regression tests - Version 0.3.0 (released 2018-09-11) - Various reliability fixes. - Merged fuzzing instrumentation. - Added regress tests. - Added support for FIDO 2’s hmac-secret extension. - New API calls: * fido_assert_hmac_secret_len; * fido_assert_hmac_secret_ptr; * fido_assert_set_extensions; * fido_assert_set_hmac_salt; * fido_cred_set_extensions; * fido_dev_force_fido2. - Support for native builds with Microsoft Visual Studio 17.- Fix RPM group. Wrap description.- Version 0.2.0 (released 2018-06-20) - Added command-line tools. - Added a couple of missing get functions. - Version 0.1.1 (released 2018-06-05) - Added documentation. - Added OpenSSL 1.0 support. - Minor fixes.- update to version 0.1.0- Initial release version 0_gitgoat24 16896679351.13.0-150400.5.6.11.13.0-150400.5.6.1fido2-assertfido2-credfido2-tokenfido2-assert.1.gzfido2-cred.1.gzfido2-token.1.gz/usr/bin//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:29838/SUSE_SLE-15-SP4_Update/42ca331cf489504e653ba09288e18023-libfido2.SUSE_SLE-15-SP4_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=658ccc327e9b89c3a793daf99ba393d998ff3124, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=2c3979084c545bf046a12da1ce26d43ddf080633, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=33e120d06af699123b926682ffc8c33452e4ddb0, for GNU/Linux 3.2.0, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)  R RRRRRRRR RR RRRRRRRR RR RRRRRRRR RR R֩g?Vڅ0ҕutf-87880c6eed3d6ca0d095c145667bcbb8aaf4b760032383848e19ba8927448c2c9?7zXZ !t/(]"k%+R(O+f69޷جr@3]g–cl95 I em(/4żW6[RtZ@&\5INk3pHc G66EJCZCCh'U5bŶCċAX, i-cQfDXMPVc(+̇2 z%X\ `k}gEZiP yQm:W2ʴ,bqD֊3\meh6懱qgvCJڙЍtCk,J`&x#ɺդVvF<\xPw`lq ՚I` d)UG\j}:d?}_ Ii?!ꡥON=zhN&='~P0er8ܠ:4^ZY=$P72Si/{e;:<9TcZ8yXXμכ?Ud3~]޷%oscc^YĎ@Qe]ҨLLvFB:^S,_ί7m&xXk7Ck%7]{ ƦVUneHW]6E< /GjvrpD2S8x!j`O VBzE9 {?;i 3qQ!GfT^^L^ ՗9]}oz2hTOb_M2UI}e> Hx]]i}8[zH@TIHj줪XǡvtbS,I;#V*وx\g /`aE'woyOa~D.E!tfC1f:F_w*VuJCAoɆxݿh7rH~<rYzG Ǚ[8Fw3=Mdx,pEV=e uwxKmO #K=oOVj}9SZՀ 8q׉խd!ؿ3(qP"d3 #Ox1*AtZX]}0hyJ"T;UX'9gE[Iht "86&l5b"\2MP:+yr[Gi2ʟ, + cN±vsnqfNuNdS'qkvNt_4!/jB c+>d*}vBO3pxiOwMfۭy#Dm-fݶ[s+vB0†x$+ [d!g ]'6>8ZGM!bK)rÑ }|p] ͒D"Q B7;*~,-6Fz޸R|+>[br5#pn.u>@0Asbս!T.B?>-"Lv`y8g(S=i.Ȏ GНYaېQ& FMDopE7e69AIrU n51O b)fX+ٞݍhR6|4W= }>izA}nwn-)17* 9w)$i)r%7)M2d hB۳aJR6)8Yj,O),;EJCw)NX=KF ׀4{s|fL>@Gf*fq_vt3r5T*+S~*OG=E&S&6R^/so[˰@!UIB6# >v*w p- Jc< lkwcqf[29="FnCT{&<hV&qFx{W`Xnkm -QNDN3ީޯ̼S9+K 7K?}{h'SWu}FCfpDt+&. W!QtkpusNwDQFIS p}f [̋Fxs2_%Ϡf;L \O.qk$8kǍV~I׏<ؕO{gMEmT)HvaѹNỗ鄺2bY{҂A=] M"ŝPrxu 2gKFqw/QE ߸{>QL5mW@#74hi(q&cP4ԙ6a27ywnbA(d5i0Gj 4P ~K!\/ѥ.MקRU= s`7mOfe֣d+OH9 xTB>%ȻRfDv/zYz"8k1*"2~\  k}: qL8ʅ_6p͌gۜۺnh!fo -8M=]ʘɱލZHCp@(?6E[|ȑ/!|x3vc4y :aHv*W[M7,*)W4.HN.-iM[hIW{љz NtUh5g?I6vڗI\㑂$@V$0I\~Hf;l>MAj`nNeL7AytEp@-ů qL.ԀNvהS1Z”'Iu Y`ҙ@f] ps[³fXc:Xh,pw~B:z85x~[$dv \D[XYYB;$ӢrQM'-A#:Ld.!QuY^jndM䢹gc`ٸC;ov}aF[ wUKVpPL˴gN]'|-Qny~g>XH5}HEm](cHOG$+pG৸8\{>q_T{ >q { \ gyNK_. v )mSpU5j^1/| e)NGp%ѻ|!-PfqH#T갘 EHʓzJ_\&݄yޘ #P`* +hn2e[ z1 fD9wQw#i{["ƃ|l ]ZvUU$0' -ÔU(Գ8lm+j1g=RZn|8/=. LKY+YZ57SzHS Ii>k}uI+It5yq$,]` nsc\֥h ],.Fc2w8 <%Vc:fU(!зaB;NO!H\yMUɀlfиw^%⫁?mͦ3TQ`=GDq8=5;|պ7ȲGbs 'OiKm} o :䣂oZ^stIþ?iYsq<1Z HXmN=SK5RkM169{#+QKtڒA'IdMDU'ˊP&ԂRDQC:խC-MeGloG^zmv'Z %a'y-\FM*GPag)tkJSX|υI}5`Tmm4DmI!3k#ltt ;}̄0B9eBєK%1YRoF䁮pNױcea㶙NJ>(S=k0/ƭS< X59]Rf~Rvɻ L&SgUgZ"Λoܮ ZS #8 5g3[s6}6m]ĮkR\_ս"-q5/PѥFtzMK+w4#އo?G>řmձwʡ9TxM3ȼ } `'iEG,w tѿ}+F hg 4('jdS5 im~.V:誂չ-gŭbI2(t3IltJ4"? s7*1Xx5 ?̐P4Y7bGOc78iB;z clXܒVgi-b A3Ž 츬=0Pve=߻39b(z@ +-2KS4 &l'xg LysdP9mk,[؈2^[0{1I2Pc Aئͣߗ%x?"xs#,е {F #"D<%iV{86$I-Ge ܸ,o2u?~/QN ͣL9SQ۰Řԓ|#}|U??,ũ_/QI  YZ