pkcs11 0.2.4-x86-mingw32 → 0.2.5-x86-mingw32

Sign up to get free protection for your applications and to get access to all the features.
@@ -1,6 +1,6 @@
1
1
  #ifndef RUBY_PK11_VERSION_H
2
2
  #define RUBY_PK11_VERSION_H
3
3
 
4
- static const char *VERSION = "0.2.4";
4
+ static const char *VERSION = "0.2.5";
5
5
 
6
6
  #endif
Binary file
Binary file
Binary file
Binary file
@@ -56,3 +56,5 @@ end
56
56
  def open_softokn(so_path=nil)
57
57
  PKCS11.open(so_path || find_softokn, :flags=>0, :pReserved=>softokn_params_string)
58
58
  end
59
+
60
+ $pkcs11 = nil
@@ -1,10 +1,18 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
 
5
- class TestPkcs11 < Test::Unit::TestCase
5
+ class TestPkcs11 < Minitest::Test
6
6
  attr_reader :pk
7
7
 
8
+ def setup
9
+ if $pkcs11
10
+ $pkcs11.close
11
+ $pkcs11 = nil
12
+ GC.start
13
+ end
14
+ end
15
+
8
16
  def open
9
17
  @pk = open_softokn
10
18
  end
@@ -33,7 +41,7 @@ class TestPkcs11 < Test::Unit::TestCase
33
41
  open
34
42
  pk.close
35
43
  pk.unload_library
36
- assert_raise(PKCS11::Error){ pk.info }
44
+ assert_raises(PKCS11::Error){ pk.info }
37
45
 
38
46
  @pk = PKCS11.open
39
47
  pk.load_library(find_softokn)
@@ -1,9 +1,9 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
  require "openssl"
5
5
 
6
- class TestPkcs11Crypt < Test::Unit::TestCase
6
+ class TestPkcs11Crypt < Minitest::Test
7
7
  include PKCS11
8
8
 
9
9
  attr_reader :slots
@@ -46,7 +46,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
46
46
  plaintext1 = "secret text"
47
47
  cryptogram = session.encrypt( :RSA_PKCS, rsa_pub_key, plaintext1)
48
48
  assert cryptogram.length>10, 'The cryptogram should contain some data'
49
- assert_not_equal cryptogram, plaintext1, 'The cryptogram should be different to plaintext'
49
+ refute_equal cryptogram, plaintext1, 'The cryptogram should be different to plaintext'
50
50
 
51
51
  plaintext2 = session.decrypt( :RSA_PKCS, rsa_priv_key, cryptogram)
52
52
  assert_equal plaintext1, plaintext2, 'Decrypted plaintext should be the same'
@@ -56,7 +56,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
56
56
  plaintext1 = "secret message "
57
57
  cryptogram = session.encrypt( {:DES3_CBC_PAD=>"\0"*8}, secret_key, plaintext1)
58
58
  assert_equal 16, cryptogram.length, 'The cryptogram should contain some data'
59
- assert_not_equal cryptogram, plaintext1, 'The cryptogram should be different to plaintext'
59
+ refute_equal cryptogram, plaintext1, 'The cryptogram should be different to plaintext'
60
60
 
61
61
  cryptogram2 = ''
62
62
  cryptogram2 << session.encrypt( {:DES3_CBC_PAD=>"\0"*8}, secret_key ) do |cipher|
@@ -83,7 +83,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
83
83
  valid = session.verify( :SHA1_RSA_PKCS, rsa_pub_key, signature, plaintext)
84
84
  assert valid, 'The signature should be correct'
85
85
 
86
- assert_raise(CKR_SIGNATURE_INVALID, 'The signature should be invalid on different text') do
86
+ assert_raises(CKR_SIGNATURE_INVALID, 'The signature should be invalid on different text') do
87
87
  session.verify( :SHA1_RSA_PKCS, rsa_pub_key, signature, "modified text")
88
88
  end
89
89
  end
@@ -1,8 +1,8 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
 
5
- class TestPkcs11Object < Test::Unit::TestCase
5
+ class TestPkcs11Object < Minitest::Test
6
6
  include PKCS11
7
7
 
8
8
  attr_reader :slots
@@ -54,7 +54,7 @@ class TestPkcs11Object < Test::Unit::TestCase
54
54
  end
55
55
 
56
56
  assert object.attributes.length>=4, 'There should be at least the 4 stored attributes readable'
57
- assert_not_nil object.attributes.find{|a| a.type==CKA_CLASS}, 'CKA_CLASS should be returned for Object#attributes'
57
+ refute_nil object.attributes.find{|a| a.type==CKA_CLASS}, 'CKA_CLASS should be returned for Object#attributes'
58
58
  end
59
59
 
60
60
  def test_accessor
@@ -87,11 +87,11 @@ class TestPkcs11Object < Test::Unit::TestCase
87
87
  object[:VALUE, PKCS11::CKA_APPLICATION] = 'value5', 'app5'
88
88
  assert_equal 'value5', object[:VALUE], "Value should have changed"
89
89
  assert_equal 'app5', object[:APPLICATION], "App should have changed"
90
- assert_raise(ArgumentError) do
90
+ assert_raises(ArgumentError) do
91
91
  object[:VALUE, PKCS11::CKA_APPLICATION, :CLASS] = 'value5', 'app5'
92
92
  end
93
93
 
94
- assert_nothing_raised{ object[] = [] }
94
+ object[] = []
95
95
  end
96
96
 
97
97
  def test_size
@@ -115,7 +115,7 @@ class TestPkcs11Object < Test::Unit::TestCase
115
115
  def test_destroy
116
116
  object.destroy
117
117
 
118
- assert_raise(CKR_OBJECT_HANDLE_INVALID, 'destroyed object shouldn\'t have any attributes') do
118
+ assert_raises(CKR_OBJECT_HANDLE_INVALID, 'destroyed object shouldn\'t have any attributes') do
119
119
  object[:VALUE]
120
120
  end
121
121
  end
@@ -1,22 +1,22 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
  require "openssl"
5
5
 
6
- class TestPkcs11Session < Test::Unit::TestCase
6
+ class TestPkcs11Session < Minitest::Test
7
7
  include PKCS11
8
-
8
+
9
9
  attr_reader :slots
10
10
  attr_reader :slot
11
11
  attr_reader :session
12
-
12
+
13
13
  TestCert_ID = "\230Z\275=\2614\236\337\fY\017Y\346\202\212\v\025\335\0239"
14
14
 
15
15
  def setup
16
16
  $pkcs11 ||= open_softokn
17
17
  @slots = pk.active_slots
18
18
  @slot = slots.last
19
-
19
+
20
20
  flags = CKF_SERIAL_SESSION #| CKF_RW_SESSION
21
21
  @session = slot.C_OpenSession(flags)
22
22
  # @session.login(:USER, "")
@@ -35,7 +35,7 @@ class TestPkcs11Session < Test::Unit::TestCase
35
35
  obj = session.find_objects(:CLASS => CKO_CERTIFICATE)
36
36
  assert obj.length>2, 'There should be some certificates in the test database'
37
37
  assert_equal PKCS11::Object, obj.first.class, 'Retuned objects should be class Object'
38
-
38
+
39
39
  session.find_objects(:CLASS => CKO_CERTIFICATE) do |obj2|
40
40
  assert obj2[:SUBJECT], 'A certificate should have a subject'
41
41
  assert OpenSSL::X509::Name.new(obj2[:SUBJECT]).to_s =~ /\/CN=/i, 'Every certificate should have a CN in the subject'
@@ -48,14 +48,14 @@ class TestPkcs11Session < Test::Unit::TestCase
48
48
  assert_equal rnd1.length, 13, 'expected length'
49
49
  rnd2 = session.generate_random(13)
50
50
  assert_equal rnd2.length, 13, 'expected length'
51
- assert_not_equal rnd1, rnd2, 'Two random blocks should be different'
51
+ refute_equal rnd1, rnd2, 'Two random blocks should be different'
52
52
  end
53
53
 
54
54
  def test_session_info
55
55
  info = session.info
56
56
  assert info.inspect =~ /flags=/, 'Session info should have a flag attribute'
57
57
  end
58
-
58
+
59
59
  def test_create_data_object
60
60
  obj = session.create_object(
61
61
  :CLASS=>CKO_DATA,
@@ -63,7 +63,7 @@ class TestPkcs11Session < Test::Unit::TestCase
63
63
  :APPLICATION=>'My Application',
64
64
  :VALUE=>'value')
65
65
  end
66
-
66
+
67
67
  def test_create_certificate_object
68
68
  obj1 = session.find_objects(:CLASS => CKO_CERTIFICATE, :ID=>TestCert_ID).first
69
69
 
@@ -77,13 +77,13 @@ class TestPkcs11Session < Test::Unit::TestCase
77
77
  :VALUE=>obj1[:VALUE],
78
78
  :SERIAL_NUMBER=>'12345'
79
79
  )
80
-
80
+
81
81
  assert_equal '12345', obj[:SERIAL_NUMBER], 'Value as created'
82
82
  end
83
-
83
+
84
84
  def test_create_public_key_object
85
85
  rsa = OpenSSL::PKey::RSA.generate(512)
86
-
86
+
87
87
  obj = session.create_object(
88
88
  :CLASS=>CKO_PUBLIC_KEY,
89
89
  :KEY_TYPE=>CKK_RSA,
@@ -91,7 +91,7 @@ class TestPkcs11Session < Test::Unit::TestCase
91
91
  :MODULUS=>rsa.n.to_s(2),
92
92
  :PUBLIC_EXPONENT=>rsa.e.to_s(2),
93
93
  :LABEL=>'test_create_public_key_object')
94
-
94
+
95
95
  assert_equal 'test_create_public_key_object', obj[:LABEL], 'Value as created'
96
96
  end
97
97
 
@@ -1,13 +1,13 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
 
5
- class TestPkcs11Slot < Test::Unit::TestCase
5
+ class TestPkcs11Slot < Minitest::Test
6
6
  include PKCS11
7
-
7
+
8
8
  attr_reader :slots
9
9
  attr_reader :slot
10
-
10
+
11
11
  def setup
12
12
  $pkcs11 ||= open_softokn
13
13
  @slots = pk.active_slots
@@ -39,7 +39,7 @@ class TestPkcs11Slot < Test::Unit::TestCase
39
39
  ti = slot.token_info
40
40
  assert ti.inspect =~ /serialNumber=/, 'Token info should contain a serialNumber'
41
41
  end
42
-
42
+
43
43
  def test_mechanisms
44
44
  assert_equal false, slot.mechanisms.empty?, 'There should be some mechanisms'
45
45
  slot.mechanisms.each do |m|
@@ -53,7 +53,7 @@ class TestPkcs11Slot < Test::Unit::TestCase
53
53
  info1 = slot.mechanism_info(:DES3_CBC)
54
54
  assert_equal CK_MECHANISM_INFO, info1.class, 'Mechanism info should get a CK_MECHANISM_INFO'
55
55
  assert info1.inspect =~ /ulMinKeySize=/, 'Mechanism info should tell about min key size'
56
-
56
+
57
57
  info2 = slot.mechanism_info(CKM_DES3_CBC)
58
58
  assert_equal info1.to_hash, info2.to_hash, 'Mechanism infos should be equal'
59
59
  end
@@ -63,7 +63,7 @@ class TestPkcs11Slot < Test::Unit::TestCase
63
63
  session = slot.open(flags){|_session|
64
64
  assert _session.info.inspect =~ /state=/, 'Session info should tell about it\'s state'
65
65
  }
66
-
66
+
67
67
  session = slot.open(flags)
68
68
  assert session.info.inspect =~ /flags=/, 'Session info should tell about it\'s flags'
69
69
  session.close
@@ -1,8 +1,8 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
 
5
- class TestPkcs11Structs < Test::Unit::TestCase
5
+ class TestPkcs11Structs < Minitest::Test
6
6
  include PKCS11
7
7
 
8
8
  def setup
@@ -19,7 +19,7 @@ class TestPkcs11Structs < Test::Unit::TestCase
19
19
  assert_equal "12", s.day
20
20
  s.day = "9"
21
21
  assert_equal "9\0", s.day
22
- assert_raise(TypeError){ s.day = nil }
22
+ assert_raises(TypeError){ s.day = nil }
23
23
  end
24
24
 
25
25
  def test_ULONG_ACCESSOR
@@ -29,7 +29,7 @@ class TestPkcs11Structs < Test::Unit::TestCase
29
29
  assert_equal 1234567890, s.ulIVSizeInBits
30
30
  s.ulIVSizeInBits = 2345678901
31
31
  assert_equal 2345678901, s.ulIVSizeInBits
32
- assert_raise(TypeError){ s.ulIVSizeInBits = nil }
32
+ assert_raises(TypeError){ s.ulIVSizeInBits = nil }
33
33
  end
34
34
 
35
35
  def test_BOOL_ACCESSOR
@@ -39,7 +39,7 @@ class TestPkcs11Structs < Test::Unit::TestCase
39
39
  assert_equal true, s.bIsExport
40
40
  s.bIsExport = false
41
41
  assert_equal false, s.bIsExport
42
- assert_raise(ArgumentError){ s.bIsExport = nil }
42
+ assert_raises(ArgumentError){ s.bIsExport = nil }
43
43
  end
44
44
 
45
45
  def test_STRING_PTR_ACCESSOR
@@ -70,7 +70,7 @@ class TestPkcs11Structs < Test::Unit::TestCase
70
70
  assert_equal 'clrnd', ri.pClientRandom
71
71
  assert_nil ri.pServerRandom
72
72
 
73
- assert_raise(ArgumentError){ s.RandomInfo = nil }
73
+ assert_raises(ArgumentError){ s.RandomInfo = nil }
74
74
  end
75
75
 
76
76
  def test_gc_STRUCT_ACCESSOR
@@ -134,7 +134,7 @@ class TestPkcs11Structs < Test::Unit::TestCase
134
134
  s.pParams = [s1, s2]
135
135
  assert_equal [s1.to_hash, s2.to_hash], s.pParams.map{|e| e.to_hash }
136
136
  GC.start
137
- assert_raise(ArgumentError){ s.pParams = [s1, s2, nil] }
137
+ assert_raises(ArgumentError){ s.pParams = [s1, s2, nil] }
138
138
  assert_equal [s1.to_hash, s2.to_hash], s.pParams.map{|e| e.to_hash }
139
139
 
140
140
  s.pParams = []
@@ -1,8 +1,8 @@
1
- require "test/unit"
1
+ require "minitest/autorun"
2
2
  require "pkcs11"
3
3
  require "test/helper"
4
4
 
5
- class TestPkcs11Thread < Test::Unit::TestCase
5
+ class TestPkcs11Thread < Minitest::Test
6
6
  include PKCS11
7
7
 
8
8
  attr_reader :slots
metadata CHANGED
@@ -1,125 +1,113 @@
1
- --- !ruby/object:Gem::Specification
1
+ --- !ruby/object:Gem::Specification
2
2
  name: pkcs11
3
- version: !ruby/object:Gem::Version
4
- hash: 31
5
- prerelease:
6
- segments:
7
- - 0
8
- - 2
9
- - 4
10
- version: 0.2.4
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.2.5
11
5
  platform: x86-mingw32
12
- authors:
6
+ authors:
13
7
  - Ryosuke Kutsuna
14
8
  - GOTOU Yuuzou
15
9
  - Lars Kanis
16
10
  autorequire:
17
11
  bindir: bin
18
- cert_chain:
12
+ cert_chain:
19
13
  - |
20
14
  -----BEGIN CERTIFICATE-----
21
- MIIDPDCCAiSgAwIBAgIBADANBgkqhkiG9w0BAQUFADBEMQ0wCwYDVQQDDARsYXJz
22
- MR8wHQYKCZImiZPyLGQBGRYPZ3JlaXotcmVpbnNkb3JmMRIwEAYKCZImiZPyLGQB
23
- GRYCZGUwHhcNMTMwMzExMjAyMjIyWhcNMTQwMzExMjAyMjIyWjBEMQ0wCwYDVQQD
24
- DARsYXJzMR8wHQYKCZImiZPyLGQBGRYPZ3JlaXotcmVpbnNkb3JmMRIwEAYKCZIm
25
- iZPyLGQBGRYCZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZb4Uv
26
- RFJfRu/VEWiy3psh2jinETjiuBrL0NeRFGf8H7iU9+gx/DI/FFhfHGLrDeIskrJx
27
- YIWDMmEjVO10UUdj7wu4ZhmU++0Cd7Kq9/TyP/shIP3IjqHjVLCnJ3P6f1cl5rxZ
28
- gqo+d3BAoDrmPk0rtaf6QopwUw9RBiF8V4HqvpiY+ruJotP5UQDP4/lVOKvA8PI9
29
- P0GmVbFBrbc7Zt5h78N3UyOK0u+nvOC23BvyHXzCtcFsXCoEkt+Wwh0RFqVZdnjM
30
- LMO2vULHKKHDdX54K/sbVCj9pN9h1aotNzrEyo55zxn0G9PHg/G3P8nMvAXPkUTe
31
- brhXrfCwWRvOXA4TAgMBAAGjOTA3MAsGA1UdDwQEAwIEsDAJBgNVHRMEAjAAMB0G
32
- A1UdDgQWBBRAHK81igrXodaDj8a8/BIKsaZrETANBgkqhkiG9w0BAQUFAAOCAQEA
33
- Iswhcol3ytXthaUH3k5LopZ09viZrZHzAw0QleI3Opl/9QEGJ2BPV9+93iC0OrNL
34
- hmnxig6vKK1EeJ5PHXJ8hOI3nTZBrOmQcEXNBqyToP1FHMWZqwZ8wiBPXtiCqDBR
35
- ePQ25J9xFNzQ1ItgzNSpx5cs67QNKrx5woocoBHD6kStFbshZPJx4axl3GbUFQd5
36
- H//3YdPQOH3jaVeUXhS+pz/gfbx8fhFAtsQ+855A3HO7g2ZRIg/atAp/0MFyn5s5
37
- 0rq+VHOIPyvxF5khT0mYAcNmZTC8z1yPsqdgwfYNDjsSWwiIRSPUSmJRvfjM8hsW
38
- mMFp4kPUHbWOqCp2mz9gCA==
15
+ MIIDLjCCAhagAwIBAgIBAjANBgkqhkiG9w0BAQUFADA9MQ4wDAYDVQQDDAVrYW5p
16
+ czEXMBUGCgmSJomT8ixkARkWB2NvbWNhcmQxEjAQBgoJkiaJk/IsZAEZFgJkZTAe
17
+ Fw0xNDAyMjYwOTMzMDBaFw0xNTAyMjYwOTMzMDBaMD0xDjAMBgNVBAMMBWthbmlz
18
+ MRcwFQYKCZImiZPyLGQBGRYHY29tY2FyZDESMBAGCgmSJomT8ixkARkWAmRlMIIB
19
+ IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApop+rNmg35bzRugZ21VMGqI6
20
+ HGzPLO4VHYncWn/xmgPU/ZMcZdfj6MzIaZJ/czXyt4eHpBk1r8QOV3gBXnRXEjVW
21
+ 9xi+EdVOkTV2/AVFKThcbTAQGiF/bT1n2M+B1GTybRzMg6hyhOJeGPqIhLfJEpxn
22
+ lJi4+ENAVT4MpqHEAGB8yFoPC0GqiOHQsdHxQV3P3c2OZqG+yJey74QtwA2tLcLn
23
+ Q53c63+VLGsOjODl1yPn/2ejyq8qWu6ahfTxiIlSar2UbwtaQGBDFdb2CXgEufXT
24
+ L7oaPxlmj+Q2oLOfOnInd2Oxop59HoJCQPsg8f921J43NCQGA8VHK6paxIRDLQID
25
+ AQABozkwNzAJBgNVHRMEAjAAMAsGA1UdDwQEAwIEsDAdBgNVHQ4EFgQUvgTdT7fe
26
+ x17ugO3IOsjEJwW7KP4wDQYJKoZIhvcNAQEFBQADggEBAFmIAhRT0awqLQN9e4Uv
27
+ ZEk+jUWv4zkb+TWiKFJXlwjPyjGbZY9gVfOwAwMibYOK/t/+57ZzW3d0L12OUwvo
28
+ on84NVvYtIr1/iskJFWFkMoIquAFCdi9p68stSPMQK2XcrJJuRot29fJtropsZBa
29
+ 2cpaNd/sRYdK4oep2usdKifA1lI0hIkPb3r5nLfwG2lAqBH7WZsUICHcTgR0VEbG
30
+ z9Ug5qQp9Uz73xC9YdGvGiuOX53LYobHAR4MWi2xxDlHI+ER8mRz0eY2FUuNu/Wj
31
+ GrqF74zpLl7/KFdHC8VmzwZS18hvDjxeLVuVI2gIGnBInqnlqv05g/l4/1pISh5j
32
+ dS4=
39
33
  -----END CERTIFICATE-----
40
-
41
- date: 2013-04-05 00:00:00 Z
42
- dependencies:
43
- - !ruby/object:Gem::Dependency
34
+ date: 2015-01-26 00:00:00.000000000 Z
35
+ dependencies:
36
+ - !ruby/object:Gem::Dependency
44
37
  name: rdoc
45
- prerelease: false
46
- requirement: &id001 !ruby/object:Gem::Requirement
47
- none: false
48
- requirements:
49
- - - ~>
50
- - !ruby/object:Gem::Version
51
- hash: 19
52
- segments:
53
- - 3
54
- - 10
55
- version: "3.10"
38
+ requirement: !ruby/object:Gem::Requirement
39
+ requirements:
40
+ - - "~>"
41
+ - !ruby/object:Gem::Version
42
+ version: '4.0'
56
43
  type: :development
57
- version_requirements: *id001
58
- - !ruby/object:Gem::Dependency
59
- name: yard
60
44
  prerelease: false
61
- requirement: &id002 !ruby/object:Gem::Requirement
62
- none: false
63
- requirements:
45
+ version_requirements: !ruby/object:Gem::Requirement
46
+ requirements:
47
+ - - "~>"
48
+ - !ruby/object:Gem::Version
49
+ version: '4.0'
50
+ - !ruby/object:Gem::Dependency
51
+ name: yard
52
+ requirement: !ruby/object:Gem::Requirement
53
+ requirements:
64
54
  - - ">="
65
- - !ruby/object:Gem::Version
66
- hash: 7
67
- segments:
68
- - 0
69
- - 6
70
- version: "0.6"
55
+ - !ruby/object:Gem::Version
56
+ version: '0.6'
71
57
  type: :development
72
- version_requirements: *id002
73
- - !ruby/object:Gem::Dependency
74
- name: rake-compiler
75
58
  prerelease: false
76
- requirement: &id003 !ruby/object:Gem::Requirement
77
- none: false
78
- requirements:
59
+ version_requirements: !ruby/object:Gem::Requirement
60
+ requirements:
61
+ - - ">="
62
+ - !ruby/object:Gem::Version
63
+ version: '0.6'
64
+ - !ruby/object:Gem::Dependency
65
+ name: rake-compiler
66
+ requirement: !ruby/object:Gem::Requirement
67
+ requirements:
79
68
  - - ">="
80
- - !ruby/object:Gem::Version
81
- hash: 5
82
- segments:
83
- - 0
84
- - 7
85
- version: "0.7"
69
+ - !ruby/object:Gem::Version
70
+ version: '0.7'
86
71
  type: :development
87
- version_requirements: *id003
88
- - !ruby/object:Gem::Dependency
89
- name: hoe
90
72
  prerelease: false
91
- requirement: &id004 !ruby/object:Gem::Requirement
92
- none: false
93
- requirements:
94
- - - ~>
95
- - !ruby/object:Gem::Version
96
- hash: 7
97
- segments:
98
- - 3
99
- - 0
100
- version: "3.0"
73
+ version_requirements: !ruby/object:Gem::Requirement
74
+ requirements:
75
+ - - ">="
76
+ - !ruby/object:Gem::Version
77
+ version: '0.7'
78
+ - !ruby/object:Gem::Dependency
79
+ name: hoe
80
+ requirement: !ruby/object:Gem::Requirement
81
+ requirements:
82
+ - - "~>"
83
+ - !ruby/object:Gem::Version
84
+ version: '3.13'
101
85
  type: :development
102
- version_requirements: *id004
103
- description: "This module allows Ruby programs to interface with \"RSA Security Inc. PKCS #11 Cryptographic Token Interface (Cryptoki)\"."
104
- email:
86
+ prerelease: false
87
+ version_requirements: !ruby/object:Gem::Requirement
88
+ requirements:
89
+ - - "~>"
90
+ - !ruby/object:Gem::Version
91
+ version: '3.13'
92
+ description: 'This module allows Ruby programs to interface with "RSA Security Inc.
93
+ PKCS #11 Cryptographic Token Interface (Cryptoki)".'
94
+ email:
105
95
  - ryosuke@deer-n-horse.jp
106
96
  - gotoyuzo@notwork.org
107
97
  - kanis@comcard.de
108
98
  executables: []
109
-
110
99
  extensions: []
111
-
112
- extra_rdoc_files:
100
+ extra_rdoc_files:
113
101
  - History.txt
114
102
  - Manifest.txt
115
103
  - README.rdoc
116
104
  - pkcs11_protect_server/Manifest.txt
117
105
  - pkcs11_protect_server/README_PROTECT_SERVER.rdoc
118
106
  - ext/pk11.c
119
- files:
120
- - .autotest
121
- - .gemtest
122
- - .yardopts
107
+ files:
108
+ - ".autotest"
109
+ - ".gemtest"
110
+ - ".yardopts"
123
111
  - History.txt
124
112
  - MIT-LICENSE
125
113
  - Manifest.txt
@@ -139,9 +127,19 @@ files:
139
127
  - ext/pk11.c
140
128
  - ext/pk11.h
141
129
  - ext/pk11_const.c
130
+ - ext/pk11_const_def.inc
142
131
  - ext/pk11_const_macros.h
132
+ - ext/pk11_struct.doc
133
+ - ext/pk11_struct_def.inc
134
+ - ext/pk11_struct_impl.inc
143
135
  - ext/pk11_struct_macros.h
136
+ - ext/pk11_thread_funcs.c
137
+ - ext/pk11_thread_funcs.h
144
138
  - ext/pk11_version.h
139
+ - lib/1.9/pkcs11_ext.so
140
+ - lib/2.0/pkcs11_ext.so
141
+ - lib/2.1/pkcs11_ext.so
142
+ - lib/2.2/pkcs11_ext.so
145
143
  - lib/pkcs11.rb
146
144
  - lib/pkcs11/extensions.rb
147
145
  - lib/pkcs11/helper.rb
@@ -149,6 +147,8 @@ files:
149
147
  - lib/pkcs11/object.rb
150
148
  - lib/pkcs11/session.rb
151
149
  - lib/pkcs11/slot.rb
150
+ - pkcs11_protect_server/Manifest.txt
151
+ - pkcs11_protect_server/README_PROTECT_SERVER.rdoc
152
152
  - test/fixtures/softokn/cert8.db
153
153
  - test/fixtures/softokn/key3.db
154
154
  - test/fixtures/softokn/secmod.db
@@ -160,56 +160,37 @@ files:
160
160
  - test/test_pkcs11_slot.rb
161
161
  - test/test_pkcs11_structs.rb
162
162
  - test/test_pkcs11_thread.rb
163
- - ext/pk11_struct_impl.inc
164
- - ext/pk11_struct_def.inc
165
- - ext/pk11_const_def.inc
166
- - ext/pk11_struct.doc
167
- - ext/pk11_thread_funcs.h
168
- - ext/pk11_thread_funcs.c
169
- - pkcs11_protect_server/Manifest.txt
170
- - pkcs11_protect_server/README_PROTECT_SERVER.rdoc
171
- - lib/1.8/pkcs11_ext.so
172
- - lib/1.9/pkcs11_ext.so
173
- - lib/2.0/pkcs11_ext.so
174
163
  homepage: http://github.com/larskanis/pkcs11
175
- licenses: []
176
-
164
+ licenses:
165
+ - MIT
166
+ metadata: {}
177
167
  post_install_message:
178
- rdoc_options:
179
- - --main
168
+ rdoc_options:
169
+ - "--main"
180
170
  - README.rdoc
181
- require_paths:
171
+ require_paths:
182
172
  - lib
183
- required_ruby_version: !ruby/object:Gem::Requirement
184
- none: false
185
- requirements:
173
+ required_ruby_version: !ruby/object:Gem::Requirement
174
+ requirements:
186
175
  - - ">="
187
- - !ruby/object:Gem::Version
188
- hash: 3
189
- segments:
190
- - 0
191
- version: "0"
192
- required_rubygems_version: !ruby/object:Gem::Requirement
193
- none: false
194
- requirements:
176
+ - !ruby/object:Gem::Version
177
+ version: '0'
178
+ required_rubygems_version: !ruby/object:Gem::Requirement
179
+ requirements:
195
180
  - - ">="
196
- - !ruby/object:Gem::Version
197
- hash: 3
198
- segments:
199
- - 0
200
- version: "0"
181
+ - !ruby/object:Gem::Version
182
+ version: '0'
201
183
  requirements: []
202
-
203
- rubyforge_project: pkcs11
204
- rubygems_version: 1.8.17
184
+ rubyforge_project:
185
+ rubygems_version: 2.4.5
205
186
  signing_key:
206
- specification_version: 3
187
+ specification_version: 4
207
188
  summary: PKCS#11 binding for Ruby
208
- test_files:
189
+ test_files:
190
+ - test/test_pkcs11_crypt.rb
191
+ - test/test_pkcs11_structs.rb
209
192
  - test/test_pkcs11_object.rb
210
193
  - test/test_pkcs11_thread.rb
211
- - test/test_pkcs11.rb
212
- - test/test_pkcs11_slot.rb
213
194
  - test/test_pkcs11_session.rb
214
- - test/test_pkcs11_structs.rb
215
- - test/test_pkcs11_crypt.rb
195
+ - test/test_pkcs11_slot.rb
196
+ - test/test_pkcs11.rb