Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

xca-2.4.0-1.2 RPM for armv7hl

From OpenSuSE Ports Tumbleweed for armv7hl

Name: xca Distribution: openSUSE Tumbleweed
Version: 2.4.0 Vendor: openSUSE
Release: 1.2 Build date: Sat May 29 09:34:16 2021
Group: Productivity/Networking/Security Build host: armbuild21
Size: 2986616 Source RPM: xca-2.4.0-1.2.src.rpm
Summary: An RSA key and certificate management tool
Graphical certification authority is an interface for managing RSA
keys and certificates, and the creation and signing of PKCS#10
requests. It uses the OpenSSL library and a Berkeley DB for key and
certificate storage. It supports importing and exporting keys and
PEM/DER/PKCS8 certificates, signing and revoking of PEM/DER/PKCS12,
and the selection of X509v3 extensions. A tree view of certificates
is presented.






* Thu May 13 2021 Martin Hauke <>
  - Update to version 2.4.0
    * Unify XCA icon (certificate) on all platforms
    * Add Microsoft BitLocker extended key usage
    * Disregard OpenSSL 0.9.8 compatibility
    * Add bash completion script
    * Add context sensitive help
    * Convert documentation from linuxdoc/SGML to sphinxdoc
    * Close #258: xca aborts on exit and on access to own templates
    * Close #142: Support Ed25519 Import / Export private SSH2 key
    * Close #142: Support Ed25519: Key-generation, import, export
    * Close #251: AuthorityKeyIdentifier: use issuer:always
    * Change language maintainer of brazilian portuguese
    * Close #230: Change PKCS12 export extension from .p12 to .pfx
    * Close #208: XCA hung when importing EC keys. For example prime256v1
    * Close #210: Make dialog to edit SAN less strict
    * Close #224: Store original path/filename on import
    * Close #213: add description to AC_DEFINE_UNQUOTED
    * Close #172 #46: Multiple OCSP Responders
    * Store default database and recently opened file as UTF8
    * Close #157 Generate and export CRLs from commandline
    * Add command line support for creating CRLs, keys and analyzing items
  - Drop patch:
    * xca-configure.patch (not longer needed)
* Sun Jul 26 2020
  - xca 2.3.0 Wed Apr 29 2020
    * Close #191 OID LN differs warning popups at startup
    * Close #189 Database compaction #189
    * Improve PKCS11 library loading for portable app
    * Refactor native separators / and \ on windows.
    * Support TLS encrypted MariaDB and PostgreSQL connection
    * Close #182: UI not using Windows native theme in 2.2.1 portable
    * Close #70: cant open ics file in ical on macos mojave
    * Close #72: Add checkbox for OCSP staple feature
    * Use DESTDIR instead of destdir when installing. Follows autotools convention.
    * Close #172 #46: Multiple OCSP Responders
    * Close #170 xca-portable-2.2.1 cannot change language
    * Fix certificate assignment when importing a CA certificate
    * Close #163: Show key type/size on column of Certificates tab
  - rebase patches
* Thu Jan 30 2020 Martin Hauke <>
  - Update to version 2.2.1
    * This is a patch release, fixing Issue #159: "Opening existing
      database" which prevented the current version opening databases
      of XCA 2.1.2
* Wed Jan 29 2020 Martin Hauke <>
  - Update to version 2.2.0
    * Most notable improvements:
      + Support concurrent database access
      + Support ODBC database driver
    A detailled changelog can be found here:
* Mon Jan 20 2020 Martin Hauke <>
  - Run spec-cleaner
* Mon Feb 04 2019 Ismail Dönmez <>
  - Cleanup spec file
  - Use Qt5
  - Refresh patches
* Tue Jan 22 2019
  -Update to 2.1.2
    * Close #40 macOS: Crash after xca v2.0.1 quit
    * Close #37: XCA 2: EVP_DecryptFinal_ex:bad decrypt
    * Close #74: Exiting XCA 2.1.1 corrupts database
    * Make PKCS11 libs, working dir and main-window size host-dependent
    * Support for XCA as portable App
    * Close #69 Library not loaded: @rpath/ contains local directory
    * Close #60: Fix MacOSX 2.1.1 binary
    * Add new maintained languages: Polish, Spanish, Portuguese
  -Update to 2.1.1
    * Allow manual override of the CSR signed flag
    * Close #56: Duplicate Serials after Upgrade 2.1.0
    * Close #57: SAN IP not working in 2.1.0
    * Close #55: Calculate "CSR signed" information from legacy database
    * Close #55: Add Certificate counter column for CSR
    * Fix slovak translation
    * Close #50: Hang while importing 1.4.1 database into 2.1.0
  -Update to 2.1.0
    * Close #48: The SKI tickbox isn't generating an SKI extension for CSRs
    * Fix translation of dates
    * Add private key icon to the key name
    * Inspired by #42: display dates relative (seconds ago, yesterday, ...)
      while column ordering is still strict by age. The ToolTip shows date
      and time.
    * Related to #39: Dynamically adjust explicit DN entries
    * Close #39: Subject entries shuffled
    * Close #36: Support adding CN to X509v3 SAN automatically
    * Close #35: Configurable size of serial number.
    * Close #34: Improve Mac OSX installation
    * Close #27: Configurable certificate expiry warning threshold
    * Generate calender (.ics) files for certificate and CRL expiries
  -Update to 2.0.1
    * Close #32: Version field contains "Created by Qt/QMake" on MacOSX
    * Review and update russian ltranslation
    * Close #31: Closing certificate details window toggles tree folding
    * Close #25: Certificates are no longer coloured
    * Close #24: Add LibreSSL support. Tested with LibreSSL 2.7.2
    * Close #23: Improve limiting to pattern in certificate tree view
    * Close #20: Unable to chose remote database type (dropdown empty)
    * Close #19: Replace 3DES encryption by AES-256 during key export
  -Update to 2.0.0
    * Open database before starting a transaction
    * Fix default hash during startup
    * Fix Importing PKCS#12 and PKCS#7 files
    * Improve automatic setting of the certificate internal name
    * Don't use remote DB descriptor as local database filename proposal
    * Usability: Preset remote database input values with previous ones
    * Add another missing windows postgres library
    * xca 2.0.0-pre04 Thu Mar 22 2018
    * Accept drivers that don't support transactions
    * Install MySQL and PostgreSQL drivers on windows
    * Closes #10: Warn if certificate without any extension is created
    * Add table prefix to be prepended to each table for remote SQL DB
    * Update translations
    * xca 2.0.0-pre03 Thu Mar 15 2018
    * Fix installation of sql plugins in the Windows installer
    * Fix opening, importing and dropping databases
    * xca 2.0.0-pre02 Tue Mar 13 2018
    * Fix crash during PKCS#12 export
    * Update HTTPS_server template and add example SAN
    * Acceppt empty password for private key decryption
    * Fix legacy database-without-password import
    * xca 2.0.0-pre01 Sun Mar 11 2018
    * Close GitHub Bug #5: Exporting a private key results in too-permissive
    * Close GitHub Bug #4: Workaround QT bug of editing in QDateTimeEdit
    * Fix display of dates in the Certificate details (local time displayed a GMT)
    * The internal name is not neccessarily unique anymore and can be edited
      in the details dialog as well as the comment.
    * CSR signing is now statically stored in the database and the comment of the
      issued certificate.
    * Private keys in the database are PKCS#8 encrypted and can be exported and
      decrypted without XCA.
    * No more incrementing serials. Only unique random serial numbers.
    * "xca_db_stat" application removed. Use the SQLite3 browser "sqlitebrowser".
    * "xca extract" functionality removed. SQL views may be used instead.
    * Each item may be commented. XCA itself comments important events in the item.
    * Each item knows its time and origin of appearance.
    * Change database format to SQL(ite) and support MySQL and PostgreSQL.
* Wed Oct 31 2018 Jan Engelhardt <>
  - Fix grammar in %description -l de.
  - Throw out old %__-type macro indirections and $RPM_ shell vars.
* Tue Oct 30 2018 Christian Wittmer <>
  - update to 1.4.1
    * Replace links to XCA on Sourceforge in the software and
    * documentation by links to my Site.
    * SF Bug #122 isValid() tried to convert the serial to 64 bit
    * Beautify mandatory distinguished name entry errors
    * Support dragging certificates and other items as PEM text
    * Show User settings and installation path in the about dialog
    * Remove SPKAC support. Netscape is not of this world anymore.
    * SF bug #124 Wrong assumptions about slots returned by PKCS11 library
    * Cleanup and improve the OID text files, remove senseless aia.txt
    * Update HTML documentation
    * Refine and document Entropy gathering
    * Indicate development and release version by git commit hash
    * Fix dumping private keys during "Dump database"
    * Fix Null pointer exception when importing PKCS#12 with OpenSSL 1.1.0
    * SF Bug #110 Exported private key from 4096 bit SSH key is wrong
    * SF Bug #109 Revoked.png isn't a valid image
    * SF Bug #121 CA serial number is ignored in hierarchical view
    * Improve speed of Bulk import.
    * Fix starting xca with a database as first arg
  - xca 1.4.0
    * Update OpenSSL version for MacOSX and W32 to 1.1.0g
    * Change default hash to SHA-256 and
    * add a warning if the default hash algorithm is SHA1 or less
    * Switch to Qt5 for Windows build and installation
    * Do not apply the default template when creating a similar cert
    * Close SF #120 Crash when importing CA certificate
    * Close SF #116 db_x509.cpp:521: Mismatching allocation and deallocation
    * Add support for OpenSSL 1.1 (by Patrick Monnerat)
    * Support generating an OpenSSL "index.txt" (by Adam Dawidowski)
    * Thales nCipher key generation changes for EC and DSA keys
    * Add Slovak translation
  - remove obsolete
    * xca-1.3.2-openssl11.patch
    * xca-doc_Makefile.patch
  - add xca-configure.patch
    * fix sgml2html command
  - cleanup spec, fix deps
* Tue Dec 05 2017
  - add xca-1.3.2-openssl11.patch to fix build on factory with



Generated by rpm2html 1.8.1

Fabrice Bellet, Fri Dec 3 23:48:33 2021