pkcs11 0.2.4-x64-mingw32 → 0.2.5-x64-mingw32

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,6 +1,6 @@
1
1
  #ifndef RUBY_PK11_VERSION_H
2
2
  #define RUBY_PK11_VERSION_H
3
3
 
4
- static const char *VERSION = "0.2.4";
4
+ static const char *VERSION = "0.2.5";
5
5
 
6
6
  #endif
Binary file
Binary file
Binary file
@@ -56,3 +56,5 @@ end
56
56
  def open_softokn(so_path=nil)
57
57
  PKCS11.open(so_path || find_softokn, :flags=>0, :pReserved=>softokn_params_string)
58
58
  end
59
+
60
+ $pkcs11 = nil
@@ -1,10 +1,18 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
 
5
- class TestPkcs11 < Test::Unit::TestCase
5
+ class TestPkcs11 < Minitest::Test
6
6
  attr_reader :pk
7
7
 
8
+ def setup
9
+ if $pkcs11
10
+ $pkcs11.close
11
+ $pkcs11 = nil
12
+ GC.start
13
+ end
14
+ end
15
+
8
16
  def open
9
17
  @pk = open_softokn
10
18
  end
@@ -33,7 +41,7 @@ class TestPkcs11 < Test::Unit::TestCase
33
41
  open
34
42
  pk.close
35
43
  pk.unload_library
36
- assert_raise(PKCS11::Error){ pk.info }
44
+ assert_raises(PKCS11::Error){ pk.info }
37
45
 
38
46
  @pk = PKCS11.open
39
47
  pk.load_library(find_softokn)
@@ -1,9 +1,9 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
  require "openssl"
5
5
 
6
- class TestPkcs11Crypt < Test::Unit::TestCase
6
+ class TestPkcs11Crypt < Minitest::Test
7
7
  include PKCS11
8
8
 
9
9
  attr_reader :slots
@@ -46,7 +46,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
46
46
  plaintext1 = "secret text"
47
47
  cryptogram = session.encrypt( :RSA_PKCS, rsa_pub_key, plaintext1)
48
48
  assert cryptogram.length>10, 'The cryptogram should contain some data'
49
- assert_not_equal cryptogram, plaintext1, 'The cryptogram should be different to plaintext'
49
+ refute_equal cryptogram, plaintext1, 'The cryptogram should be different to plaintext'
50
50
 
51
51
  plaintext2 = session.decrypt( :RSA_PKCS, rsa_priv_key, cryptogram)
52
52
  assert_equal plaintext1, plaintext2, 'Decrypted plaintext should be the same'
@@ -56,7 +56,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
56
56
  plaintext1 = "secret message "
57
57
  cryptogram = session.encrypt( {:DES3_CBC_PAD=>"\0"*8}, secret_key, plaintext1)
58
58
  assert_equal 16, cryptogram.length, 'The cryptogram should contain some data'
59
- assert_not_equal cryptogram, plaintext1, 'The cryptogram should be different to plaintext'
59
+ refute_equal cryptogram, plaintext1, 'The cryptogram should be different to plaintext'
60
60
 
61
61
  cryptogram2 = ''
62
62
  cryptogram2 << session.encrypt( {:DES3_CBC_PAD=>"\0"*8}, secret_key ) do |cipher|
@@ -83,7 +83,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
83
83
  valid = session.verify( :SHA1_RSA_PKCS, rsa_pub_key, signature, plaintext)
84
84
  assert valid, 'The signature should be correct'
85
85
 
86
- assert_raise(CKR_SIGNATURE_INVALID, 'The signature should be invalid on different text') do
86
+ assert_raises(CKR_SIGNATURE_INVALID, 'The signature should be invalid on different text') do
87
87
  session.verify( :SHA1_RSA_PKCS, rsa_pub_key, signature, "modified text")
88
88
  end
89
89
  end
@@ -1,8 +1,8 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
 
5
- class TestPkcs11Object < Test::Unit::TestCase
5
+ class TestPkcs11Object < Minitest::Test
6
6
  include PKCS11
7
7
 
8
8
  attr_reader :slots
@@ -54,7 +54,7 @@ class TestPkcs11Object < Test::Unit::TestCase
54
54
  end
55
55
 
56
56
  assert object.attributes.length>=4, 'There should be at least the 4 stored attributes readable'
57
- assert_not_nil object.attributes.find{|a| a.type==CKA_CLASS}, 'CKA_CLASS should be returned for Object#attributes'
57
+ refute_nil object.attributes.find{|a| a.type==CKA_CLASS}, 'CKA_CLASS should be returned for Object#attributes'
58
58
  end
59
59
 
60
60
  def test_accessor
@@ -87,11 +87,11 @@ class TestPkcs11Object < Test::Unit::TestCase
87
87
  object[:VALUE, PKCS11::CKA_APPLICATION] = 'value5', 'app5'
88
88
  assert_equal 'value5', object[:VALUE], "Value should have changed"
89
89
  assert_equal 'app5', object[:APPLICATION], "App should have changed"
90
- assert_raise(ArgumentError) do
90
+ assert_raises(ArgumentError) do
91
91
  object[:VALUE, PKCS11::CKA_APPLICATION, :CLASS] = 'value5', 'app5'
92
92
  end
93
93
 
94
- assert_nothing_raised{ object[] = [] }
94
+ object[] = []
95
95
  end
96
96
 
97
97
  def test_size
@@ -115,7 +115,7 @@ class TestPkcs11Object < Test::Unit::TestCase
115
115
  def test_destroy
116
116
  object.destroy
117
117
 
118
- assert_raise(CKR_OBJECT_HANDLE_INVALID, 'destroyed object shouldn\'t have any attributes') do
118
+ assert_raises(CKR_OBJECT_HANDLE_INVALID, 'destroyed object shouldn\'t have any attributes') do
119
119
  object[:VALUE]
120
120
  end
121
121
  end
@@ -1,22 +1,22 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
  require "openssl"
5
5
 
6
- class TestPkcs11Session < Test::Unit::TestCase
6
+ class TestPkcs11Session < Minitest::Test
7
7
  include PKCS11
8
-
8
+
9
9
  attr_reader :slots
10
10
  attr_reader :slot
11
11
  attr_reader :session
12
-
12
+
13
13
  TestCert_ID = "\230Z\275=\2614\236\337\fY\017Y\346\202\212\v\025\335\0239"
14
14
 
15
15
  def setup
16
16
  $pkcs11 ||= open_softokn
17
17
  @slots = pk.active_slots
18
18
  @slot = slots.last
19
-
19
+
20
20
  flags = CKF_SERIAL_SESSION #| CKF_RW_SESSION
21
21
  @session = slot.C_OpenSession(flags)
22
22
  # @session.login(:USER, "")
@@ -35,7 +35,7 @@ class TestPkcs11Session < Test::Unit::TestCase
35
35
  obj = session.find_objects(:CLASS => CKO_CERTIFICATE)
36
36
  assert obj.length>2, 'There should be some certificates in the test database'
37
37
  assert_equal PKCS11::Object, obj.first.class, 'Retuned objects should be class Object'
38
-
38
+
39
39
  session.find_objects(:CLASS => CKO_CERTIFICATE) do |obj2|
40
40
  assert obj2[:SUBJECT], 'A certificate should have a subject'
41
41
  assert OpenSSL::X509::Name.new(obj2[:SUBJECT]).to_s =~ /\/CN=/i, 'Every certificate should have a CN in the subject'
@@ -48,14 +48,14 @@ class TestPkcs11Session < Test::Unit::TestCase
48
48
  assert_equal rnd1.length, 13, 'expected length'
49
49
  rnd2 = session.generate_random(13)
50
50
  assert_equal rnd2.length, 13, 'expected length'
51
- assert_not_equal rnd1, rnd2, 'Two random blocks should be different'
51
+ refute_equal rnd1, rnd2, 'Two random blocks should be different'
52
52
  end
53
53
 
54
54
  def test_session_info
55
55
  info = session.info
56
56
  assert info.inspect =~ /flags=/, 'Session info should have a flag attribute'
57
57
  end
58
-
58
+
59
59
  def test_create_data_object
60
60
  obj = session.create_object(
61
61
  :CLASS=>CKO_DATA,
@@ -63,7 +63,7 @@ class TestPkcs11Session < Test::Unit::TestCase
63
63
  :APPLICATION=>'My Application',
64
64
  :VALUE=>'value')
65
65
  end
66
-
66
+
67
67
  def test_create_certificate_object
68
68
  obj1 = session.find_objects(:CLASS => CKO_CERTIFICATE, :ID=>TestCert_ID).first
69
69
 
@@ -77,13 +77,13 @@ class TestPkcs11Session < Test::Unit::TestCase
77
77
  :VALUE=>obj1[:VALUE],
78
78
  :SERIAL_NUMBER=>'12345'
79
79
  )
80
-
80
+
81
81
  assert_equal '12345', obj[:SERIAL_NUMBER], 'Value as created'
82
82
  end
83
-
83
+
84
84
  def test_create_public_key_object
85
85
  rsa = OpenSSL::PKey::RSA.generate(512)
86
-
86
+
87
87
  obj = session.create_object(
88
88
  :CLASS=>CKO_PUBLIC_KEY,
89
89
  :KEY_TYPE=>CKK_RSA,
@@ -91,7 +91,7 @@ class TestPkcs11Session < Test::Unit::TestCase
91
91
  :MODULUS=>rsa.n.to_s(2),
92
92
  :PUBLIC_EXPONENT=>rsa.e.to_s(2),
93
93
  :LABEL=>'test_create_public_key_object')
94
-
94
+
95
95
  assert_equal 'test_create_public_key_object', obj[:LABEL], 'Value as created'
96
96
  end
97
97
 
@@ -1,13 +1,13 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
 
5
- class TestPkcs11Slot < Test::Unit::TestCase
5
+ class TestPkcs11Slot < Minitest::Test
6
6
  include PKCS11
7
-
7
+
8
8
  attr_reader :slots
9
9
  attr_reader :slot
10
-
10
+
11
11
  def setup
12
12
  $pkcs11 ||= open_softokn
13
13
  @slots = pk.active_slots
@@ -39,7 +39,7 @@ class TestPkcs11Slot < Test::Unit::TestCase
39
39
  ti = slot.token_info
40
40
  assert ti.inspect =~ /serialNumber=/, 'Token info should contain a serialNumber'
41
41
  end
42
-
42
+
43
43
  def test_mechanisms
44
44
  assert_equal false, slot.mechanisms.empty?, 'There should be some mechanisms'
45
45
  slot.mechanisms.each do |m|
@@ -53,7 +53,7 @@ class TestPkcs11Slot < Test::Unit::TestCase
53
53
  info1 = slot.mechanism_info(:DES3_CBC)
54
54
  assert_equal CK_MECHANISM_INFO, info1.class, 'Mechanism info should get a CK_MECHANISM_INFO'
55
55
  assert info1.inspect =~ /ulMinKeySize=/, 'Mechanism info should tell about min key size'
56
-
56
+
57
57
  info2 = slot.mechanism_info(CKM_DES3_CBC)
58
58
  assert_equal info1.to_hash, info2.to_hash, 'Mechanism infos should be equal'
59
59
  end
@@ -63,7 +63,7 @@ class TestPkcs11Slot < Test::Unit::TestCase
63
63
  session = slot.open(flags){|_session|
64
64
  assert _session.info.inspect =~ /state=/, 'Session info should tell about it\'s state'
65
65
  }
66
-
66
+
67
67
  session = slot.open(flags)
68
68
  assert session.info.inspect =~ /flags=/, 'Session info should tell about it\'s flags'
69
69
  session.close
@@ -1,8 +1,8 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
 
5
- class TestPkcs11Structs < Test::Unit::TestCase
5
+ class TestPkcs11Structs < Minitest::Test
6
6
  include PKCS11
7
7
 
8
8
  def setup
@@ -19,7 +19,7 @@ class TestPkcs11Structs < Test::Unit::TestCase
19
19
  assert_equal "12", s.day
20
20
  s.day = "9"
21
21
  assert_equal "9\0", s.day
22
- assert_raise(TypeError){ s.day = nil }
22
+ assert_raises(TypeError){ s.day = nil }
23
23
  end
24
24
 
25
25
  def test_ULONG_ACCESSOR
@@ -29,7 +29,7 @@ class TestPkcs11Structs < Test::Unit::TestCase
29
29
  assert_equal 1234567890, s.ulIVSizeInBits
30
30
  s.ulIVSizeInBits = 2345678901
31
31
  assert_equal 2345678901, s.ulIVSizeInBits
32
- assert_raise(TypeError){ s.ulIVSizeInBits = nil }
32
+ assert_raises(TypeError){ s.ulIVSizeInBits = nil }
33
33
  end
34
34
 
35
35
  def test_BOOL_ACCESSOR
@@ -39,7 +39,7 @@ class TestPkcs11Structs < Test::Unit::TestCase
39
39
  assert_equal true, s.bIsExport
40
40
  s.bIsExport = false
41
41
  assert_equal false, s.bIsExport
42
- assert_raise(ArgumentError){ s.bIsExport = nil }
42
+ assert_raises(ArgumentError){ s.bIsExport = nil }
43
43
  end
44
44
 
45
45
  def test_STRING_PTR_ACCESSOR
@@ -70,7 +70,7 @@ class TestPkcs11Structs < Test::Unit::TestCase
70
70
  assert_equal 'clrnd', ri.pClientRandom
71
71
  assert_nil ri.pServerRandom
72
72
 
73
- assert_raise(ArgumentError){ s.RandomInfo = nil }
73
+ assert_raises(ArgumentError){ s.RandomInfo = nil }
74
74
  end
75
75
 
76
76
  def test_gc_STRUCT_ACCESSOR
@@ -134,7 +134,7 @@ class TestPkcs11Structs < Test::Unit::TestCase
134
134
  s.pParams = [s1, s2]
135
135
  assert_equal [s1.to_hash, s2.to_hash], s.pParams.map{|e| e.to_hash }
136
136
  GC.start
137
- assert_raise(ArgumentError){ s.pParams = [s1, s2, nil] }
137
+ assert_raises(ArgumentError){ s.pParams = [s1, s2, nil] }
138
138
  assert_equal [s1.to_hash, s2.to_hash], s.pParams.map{|e| e.to_hash }
139
139
 
140
140
  s.pParams = []
@@ -1,8 +1,8 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
 
5
- class TestPkcs11Thread < Test::Unit::TestCase
5
+ class TestPkcs11Thread < Minitest::Test
6
6
  include PKCS11
7
7
 
8
8
  attr_reader :slots
metadata CHANGED
@@ -1,125 +1,113 @@
1
- --- !ruby/object:Gem::Specification
1
+ --- !ruby/object:Gem::Specification
2
2
  name: pkcs11
3
- version: !ruby/object:Gem::Version
4
- hash: 31
5
- prerelease:
6
- segments:
7
- - 0
8
- - 2
9
- - 4
10
- version: 0.2.4
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.2.5
11
5
  platform: x64-mingw32
12
- authors:
6
+ authors:
13
7
  - Ryosuke Kutsuna
14
8
  - GOTOU Yuuzou
15
9
  - Lars Kanis
16
10
  autorequire:
17
11
  bindir: bin
18
- cert_chain:
12
+ cert_chain:
19
13
  - |
20
14
  -----BEGIN CERTIFICATE-----
21
- MIIDPDCCAiSgAwIBAgIBADANBgkqhkiG9w0BAQUFADBEMQ0wCwYDVQQDDARsYXJz
22
- MR8wHQYKCZImiZPyLGQBGRYPZ3JlaXotcmVpbnNkb3JmMRIwEAYKCZImiZPyLGQB
23
- GRYCZGUwHhcNMTMwMzExMjAyMjIyWhcNMTQwMzExMjAyMjIyWjBEMQ0wCwYDVQQD
24
- DARsYXJzMR8wHQYKCZImiZPyLGQBGRYPZ3JlaXotcmVpbnNkb3JmMRIwEAYKCZIm
25
- iZPyLGQBGRYCZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZb4Uv
26
- RFJfRu/VEWiy3psh2jinETjiuBrL0NeRFGf8H7iU9+gx/DI/FFhfHGLrDeIskrJx
27
- YIWDMmEjVO10UUdj7wu4ZhmU++0Cd7Kq9/TyP/shIP3IjqHjVLCnJ3P6f1cl5rxZ
28
- gqo+d3BAoDrmPk0rtaf6QopwUw9RBiF8V4HqvpiY+ruJotP5UQDP4/lVOKvA8PI9
29
- P0GmVbFBrbc7Zt5h78N3UyOK0u+nvOC23BvyHXzCtcFsXCoEkt+Wwh0RFqVZdnjM
30
- LMO2vULHKKHDdX54K/sbVCj9pN9h1aotNzrEyo55zxn0G9PHg/G3P8nMvAXPkUTe
31
- brhXrfCwWRvOXA4TAgMBAAGjOTA3MAsGA1UdDwQEAwIEsDAJBgNVHRMEAjAAMB0G
32
- A1UdDgQWBBRAHK81igrXodaDj8a8/BIKsaZrETANBgkqhkiG9w0BAQUFAAOCAQEA
33
- Iswhcol3ytXthaUH3k5LopZ09viZrZHzAw0QleI3Opl/9QEGJ2BPV9+93iC0OrNL
34
- hmnxig6vKK1EeJ5PHXJ8hOI3nTZBrOmQcEXNBqyToP1FHMWZqwZ8wiBPXtiCqDBR
35
- ePQ25J9xFNzQ1ItgzNSpx5cs67QNKrx5woocoBHD6kStFbshZPJx4axl3GbUFQd5
36
- H//3YdPQOH3jaVeUXhS+pz/gfbx8fhFAtsQ+855A3HO7g2ZRIg/atAp/0MFyn5s5
37
- 0rq+VHOIPyvxF5khT0mYAcNmZTC8z1yPsqdgwfYNDjsSWwiIRSPUSmJRvfjM8hsW
38
- mMFp4kPUHbWOqCp2mz9gCA==
15
+ MIIDLjCCAhagAwIBAgIBAjANBgkqhkiG9w0BAQUFADA9MQ4wDAYDVQQDDAVrYW5p
16
+ czEXMBUGCgmSJomT8ixkARkWB2NvbWNhcmQxEjAQBgoJkiaJk/IsZAEZFgJkZTAe
17
+ Fw0xNDAyMjYwOTMzMDBaFw0xNTAyMjYwOTMzMDBaMD0xDjAMBgNVBAMMBWthbmlz
18
+ MRcwFQYKCZImiZPyLGQBGRYHY29tY2FyZDESMBAGCgmSJomT8ixkARkWAmRlMIIB
19
+ IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApop+rNmg35bzRugZ21VMGqI6
20
+ HGzPLO4VHYncWn/xmgPU/ZMcZdfj6MzIaZJ/czXyt4eHpBk1r8QOV3gBXnRXEjVW
21
+ 9xi+EdVOkTV2/AVFKThcbTAQGiF/bT1n2M+B1GTybRzMg6hyhOJeGPqIhLfJEpxn
22
+ lJi4+ENAVT4MpqHEAGB8yFoPC0GqiOHQsdHxQV3P3c2OZqG+yJey74QtwA2tLcLn
23
+ Q53c63+VLGsOjODl1yPn/2ejyq8qWu6ahfTxiIlSar2UbwtaQGBDFdb2CXgEufXT
24
+ L7oaPxlmj+Q2oLOfOnInd2Oxop59HoJCQPsg8f921J43NCQGA8VHK6paxIRDLQID
25
+ AQABozkwNzAJBgNVHRMEAjAAMAsGA1UdDwQEAwIEsDAdBgNVHQ4EFgQUvgTdT7fe
26
+ x17ugO3IOsjEJwW7KP4wDQYJKoZIhvcNAQEFBQADggEBAFmIAhRT0awqLQN9e4Uv
27
+ ZEk+jUWv4zkb+TWiKFJXlwjPyjGbZY9gVfOwAwMibYOK/t/+57ZzW3d0L12OUwvo
28
+ on84NVvYtIr1/iskJFWFkMoIquAFCdi9p68stSPMQK2XcrJJuRot29fJtropsZBa
29
+ 2cpaNd/sRYdK4oep2usdKifA1lI0hIkPb3r5nLfwG2lAqBH7WZsUICHcTgR0VEbG
30
+ z9Ug5qQp9Uz73xC9YdGvGiuOX53LYobHAR4MWi2xxDlHI+ER8mRz0eY2FUuNu/Wj
31
+ GrqF74zpLl7/KFdHC8VmzwZS18hvDjxeLVuVI2gIGnBInqnlqv05g/l4/1pISh5j
32
+ dS4=
39
33
  -----END CERTIFICATE-----
40
-
41
- date: 2013-04-05 00:00:00 Z
42
- dependencies:
43
- - !ruby/object:Gem::Dependency
34
+ date: 2015-01-26 00:00:00.000000000 Z
35
+ dependencies:
36
+ - !ruby/object:Gem::Dependency
44
37
  name: rdoc
45
- prerelease: false
46
- requirement: &id001 !ruby/object:Gem::Requirement
47
- none: false
48
- requirements:
49
- - - ~>
50
- - !ruby/object:Gem::Version
51
- hash: 19
52
- segments:
53
- - 3
54
- - 10
55
- version: "3.10"
38
+ requirement: !ruby/object:Gem::Requirement
39
+ requirements:
40
+ - - "~>"
41
+ - !ruby/object:Gem::Version
42
+ version: '4.0'
56
43
  type: :development
57
- version_requirements: *id001
58
- - !ruby/object:Gem::Dependency
59
- name: yard
60
44
  prerelease: false
61
- requirement: &id002 !ruby/object:Gem::Requirement
62
- none: false
63
- requirements:
45
+ version_requirements: !ruby/object:Gem::Requirement
46
+ requirements:
47
+ - - "~>"
48
+ - !ruby/object:Gem::Version
49
+ version: '4.0'
50
+ - !ruby/object:Gem::Dependency
51
+ name: yard
52
+ requirement: !ruby/object:Gem::Requirement
53
+ requirements:
64
54
  - - ">="
65
- - !ruby/object:Gem::Version
66
- hash: 7
67
- segments:
68
- - 0
69
- - 6
70
- version: "0.6"
55
+ - !ruby/object:Gem::Version
56
+ version: '0.6'
71
57
  type: :development
72
- version_requirements: *id002
73
- - !ruby/object:Gem::Dependency
74
- name: rake-compiler
75
58
  prerelease: false
76
- requirement: &id003 !ruby/object:Gem::Requirement
77
- none: false
78
- requirements:
59
+ version_requirements: !ruby/object:Gem::Requirement
60
+ requirements:
79
61
  - - ">="
80
- - !ruby/object:Gem::Version
81
- hash: 5
82
- segments:
83
- - 0
84
- - 7
85
- version: "0.7"
62
+ - !ruby/object:Gem::Version
63
+ version: '0.6'
64
+ - !ruby/object:Gem::Dependency
65
+ name: rake-compiler
66
+ requirement: !ruby/object:Gem::Requirement
67
+ requirements:
68
+ - - ">="
69
+ - !ruby/object:Gem::Version
70
+ version: '0.7'
86
71
  type: :development
87
- version_requirements: *id003
88
- - !ruby/object:Gem::Dependency
89
- name: hoe
90
72
  prerelease: false
91
- requirement: &id004 !ruby/object:Gem::Requirement
92
- none: false
93
- requirements:
94
- - - ~>
95
- - !ruby/object:Gem::Version
96
- hash: 7
97
- segments:
98
- - 3
99
- - 0
100
- version: "3.0"
73
+ version_requirements: !ruby/object:Gem::Requirement
74
+ requirements:
75
+ - - ">="
76
+ - !ruby/object:Gem::Version
77
+ version: '0.7'
78
+ - !ruby/object:Gem::Dependency
79
+ name: hoe
80
+ requirement: !ruby/object:Gem::Requirement
81
+ requirements:
82
+ - - "~>"
83
+ - !ruby/object:Gem::Version
84
+ version: '3.13'
101
85
  type: :development
102
- version_requirements: *id004
103
- description: "This module allows Ruby programs to interface with \"RSA Security Inc. PKCS #11 Cryptographic Token Interface (Cryptoki)\"."
104
- email:
86
+ prerelease: false
87
+ version_requirements: !ruby/object:Gem::Requirement
88
+ requirements:
89
+ - - "~>"
90
+ - !ruby/object:Gem::Version
91
+ version: '3.13'
92
+ description: 'This module allows Ruby programs to interface with "RSA Security Inc.
93
+ PKCS #11 Cryptographic Token Interface (Cryptoki)".'
94
+ email:
105
95
  - ryosuke@deer-n-horse.jp
106
96
  - gotoyuzo@notwork.org
107
97
  - kanis@comcard.de
108
98
  executables: []
109
-
110
99
  extensions: []
111
-
112
- extra_rdoc_files:
100
+ extra_rdoc_files:
113
101
  - History.txt
114
102
  - Manifest.txt
115
103
  - README.rdoc
116
104
  - pkcs11_protect_server/Manifest.txt
117
105
  - pkcs11_protect_server/README_PROTECT_SERVER.rdoc
118
106
  - ext/pk11.c
119
- files:
120
- - .autotest
121
- - .gemtest
122
- - .yardopts
107
+ files:
108
+ - ".autotest"
109
+ - ".gemtest"
110
+ - ".yardopts"
123
111
  - History.txt
124
112
  - MIT-LICENSE
125
113
  - Manifest.txt
@@ -139,9 +127,18 @@ files:
139
127
  - ext/pk11.c
140
128
  - ext/pk11.h
141
129
  - ext/pk11_const.c
130
+ - ext/pk11_const_def.inc
142
131
  - ext/pk11_const_macros.h
132
+ - ext/pk11_struct.doc
133
+ - ext/pk11_struct_def.inc
134
+ - ext/pk11_struct_impl.inc
143
135
  - ext/pk11_struct_macros.h
136
+ - ext/pk11_thread_funcs.c
137
+ - ext/pk11_thread_funcs.h
144
138
  - ext/pk11_version.h
139
+ - lib/2.0/pkcs11_ext.so
140
+ - lib/2.1/pkcs11_ext.so
141
+ - lib/2.2/pkcs11_ext.so
145
142
  - lib/pkcs11.rb
146
143
  - lib/pkcs11/extensions.rb
147
144
  - lib/pkcs11/helper.rb
@@ -149,6 +146,8 @@ files:
149
146
  - lib/pkcs11/object.rb
150
147
  - lib/pkcs11/session.rb
151
148
  - lib/pkcs11/slot.rb
149
+ - pkcs11_protect_server/Manifest.txt
150
+ - pkcs11_protect_server/README_PROTECT_SERVER.rdoc
152
151
  - test/fixtures/softokn/cert8.db
153
152
  - test/fixtures/softokn/key3.db
154
153
  - test/fixtures/softokn/secmod.db
@@ -160,54 +159,37 @@ files:
160
159
  - test/test_pkcs11_slot.rb
161
160
  - test/test_pkcs11_structs.rb
162
161
  - test/test_pkcs11_thread.rb
163
- - ext/pk11_struct_impl.inc
164
- - ext/pk11_struct_def.inc
165
- - ext/pk11_const_def.inc
166
- - ext/pk11_struct.doc
167
- - ext/pk11_thread_funcs.h
168
- - ext/pk11_thread_funcs.c
169
- - pkcs11_protect_server/Manifest.txt
170
- - pkcs11_protect_server/README_PROTECT_SERVER.rdoc
171
- - lib/2.0/pkcs11_ext.so
172
162
  homepage: http://github.com/larskanis/pkcs11
173
- licenses: []
174
-
163
+ licenses:
164
+ - MIT
165
+ metadata: {}
175
166
  post_install_message:
176
- rdoc_options:
177
- - --main
167
+ rdoc_options:
168
+ - "--main"
178
169
  - README.rdoc
179
- require_paths:
170
+ require_paths:
180
171
  - lib
181
- required_ruby_version: !ruby/object:Gem::Requirement
182
- none: false
183
- requirements:
172
+ required_ruby_version: !ruby/object:Gem::Requirement
173
+ requirements:
184
174
  - - ">="
185
- - !ruby/object:Gem::Version
186
- hash: 3
187
- segments:
188
- - 0
189
- version: "0"
190
- required_rubygems_version: !ruby/object:Gem::Requirement
191
- none: false
192
- requirements:
175
+ - !ruby/object:Gem::Version
176
+ version: '0'
177
+ required_rubygems_version: !ruby/object:Gem::Requirement
178
+ requirements:
193
179
  - - ">="
194
- - !ruby/object:Gem::Version
195
- hash: 3
196
- segments:
197
- - 0
198
- version: "0"
180
+ - !ruby/object:Gem::Version
181
+ version: '0'
199
182
  requirements: []
200
-
201
- rubyforge_project: pkcs11
202
- rubygems_version: 1.8.17
183
+ rubyforge_project:
184
+ rubygems_version: 2.4.5
203
185
  signing_key:
204
- specification_version: 3
186
+ specification_version: 4
205
187
  summary: PKCS#11 binding for Ruby
206
- test_files:
188
+ test_files:
189
+ - test/test_pkcs11_crypt.rb
190
+ - test/test_pkcs11_structs.rb
207
191
  - test/test_pkcs11_object.rb
208
192
  - test/test_pkcs11_thread.rb
209
- - test/test_pkcs11.rb
210
- - test/test_pkcs11_slot.rb
211
193
  - test/test_pkcs11_session.rb
212
- - test/test_pkcs11_structs.rb
213
- - test/test_pkcs11_crypt.rb
194
+ - test/test_pkcs11_slot.rb
195
+ - test/test_pkcs11.rb