libopenssl-devel-1.1.0i-lp151.1.1 >  A [;/=„ut8WXP58V}i!|TD)E#\r@e&f o9>#}L?7u<4o{w !9fS@ҹ7JdR|5ʲ%{ߧVp[YanwhHH"lQ'$sI)i LR񜺾񖈥{< )h fX&&# s9KDAF3U≀+Q?YަmxzŬA= [d3<:s~q 5ƔgRͷ>]_{PT2 ] 6U?2x왝KNj*Mh@/usDgl2}Io`Jh@r}r[ / MX2sܭq ]X?>p>?d $ Z >W]dl p t |  x0(b8l9:BF3GHHPIXX\YtZ[\]^bHcdOeTfWlYulvtzClibopenssl-devel1.1.0ilp151.1.1Include Files and Libraries mandatory for DevelopmentThis package contains all necessary include files and libraries needed to develop applications that require these.[5lamb16openSUSE Leap 15.1openSUSEOpenSSLhttps://bugs.opensuse.orgDevelopment/Libraries/C and C++https://www.openssl.org/linuxnoarchA큤[5[4eef67dcbef925a5291e880107c8d5b1f08fea8cb5cc203851dcbf02d7557cf28rootrootrootrootopenssl-1.1.0i-lp151.1.1.src.rpmlibopenssl-developenssl-develpkgconfig(libcrypto)pkgconfig(libopenssl)pkgconfig(libssl)pkgconfig(openssl)    libopenssl-1_1-devellibopenssl1_1opensslpkgconfigrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.1.0i1.1.0i1.1.0i3.0.4-14.6.0-14.0-15.2-14.14.1[ug@Z2@ZZNYYYdYMY, @Y%uY i@YtYXXXX@X6@WSWSW_@W@WW(WWV޾VՄ@VVa@Ub@U'U@U>UzUyx@Ua@U @T TTk4Ti@T\@TFJS@SSS@SSh@S[S|@Sl@Sg}@Sg}@SSSSSRe@SRe@SRe@SQSG@SCS1oSnR2@RRΏ@R=R=RTR@R uid Matt Caswell sub 2048R/E3C21B70 2013-04-30 - openssl-1.0.1e-fips.patch: rediffed - openssl-1.0.1i-noec2m-fix.patch: removed (upstream) - openssl-ocloexec.patch: rediffed- suse_version 10.1 & 10.2 x86_64 can not enable-ec_nistp_64_gcc_128- openssl-1.0.1i-noec2m-fix.patch: only report the Elliptic Curves we actually support (not the binary ones) (bnc#905037)- openSUSE < 11.2 doesn't have accept4()- openSSL 1.0.1j * Fix SRTP Memory Leak (CVE-2014-3513) * Session Ticket Memory Leak (CVE-2014-3567) * Add SSL 3.0 Fallback protection (TLS_FALLBACK_SCSV) * Build option no-ssl3 is incomplete (CVE-2014-3568)- openssl.keyring: the 1.0.1i release was done by Matt Caswell UK 0E604491- rename README.SuSE (old spelling) to README.SUSE (bnc#889013)- update to 1.0.1i * Fix SRP buffer overrun vulnerability. Invalid parameters passed to the SRP code can be overrun an internal buffer. Add sanity check that g, A, B < N to SRP code. (CVE-2014-3512) * A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate TLS 1.0 instead of higher protocol versions when the ClientHello message is badly fragmented. This allows a man-in-the-middle attacker to force a downgrade to TLS 1.0 even if both the server and the client support a higher protocol version, by modifying the client's TLS records. (CVE-2014-3511) * OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to a denial of service attack. A malicious server can crash the client with a null pointer dereference (read) by specifying an anonymous (EC)DH ciphersuite and sending carefully crafted handshake messages. (CVE-2014-3510) * By sending carefully crafted DTLS packets an attacker could cause openssl to leak memory. This can be exploited through a Denial of Service attack. (CVE-2014-3507) * An attacker can force openssl to consume large amounts of memory whilst processing DTLS handshake messages. This can be exploited through a Denial of Service attack. (CVE-2014-3506) * An attacker can force an error condition which causes openssl to crash whilst processing DTLS packets due to memory being freed twice. This can be exploited through a Denial of Service attack. (CVE-2014-3505) * If a multithreaded client connects to a malicious server using a resumed session and the server sends an ec point format extension it could write up to 255 bytes to freed memory. (CVE-2014-3509) * A malicious server can crash an OpenSSL client with a null pointer dereference (read) by specifying an SRP ciphersuite even though it was not properly negotiated with the client. This can be exploited through a Denial of Service attack. (CVE-2014-5139) * A flaw in OBJ_obj2txt may cause pretty printing functions such as X509_name_oneline, X509_name_print_ex et al. to leak some information from the stack. Applications may be affected if they echo pretty printing output to the attacker. (CVE-2014-3508) * Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.) for corner cases. (Certain input points at infinity could lead to bogus results, with non-infinity inputs mapped to infinity too.) - refreshed patches: * openssl-1.0.1e-new-fips-reqs.patch * 0005-libssl-Hide-library-private-symbols.patch (thanks to Marcus Meissner)- Move manpages around: *.1ssl should be in openssl (e.g. ciphers(1ssl) is also referenced by openssl(1)), and *.3ssl should be in openssl-doc.- recommend: ca-certificates-mozilla instead of openssl-certs- updated openssl to 1.0.1h (bnc#880891): - CVE-2014-0224: Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. - CVE-2014-0221: Fix DTLS recursion flaw. By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. - CVE-2014-0195: Fix DTLS invalid fragment vulnerability. A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. - CVE-2014-3470: Fix bug in TLS code where clients enable anonymous ECDH ciphersuites are subject to a denial of service attack. - openssl-buffreelistbug-aka-CVE-2010-5298.patch: removed, upstream - CVE-2014-0198.patch: removed, upstream - 0009-Fix-double-frees.patch: removed, upstream - 0012-Fix-eckey_priv_encode.patch: removed, upstream - 0017-Double-free-in-i2o_ECPublicKey.patch: removed, upstream - 0018-fix-coverity-issues-966593-966596.patch: removed, upstream - 0020-Initialize-num-properly.patch: removed, upstream - 0022-bignum-allow-concurrent-BN_MONT_CTX_set_locked.patch: removed, upstream - 0023-evp-prevent-underflow-in-base64-decoding.patch: removed, upstream - 0024-Fixed-NULL-pointer-dereference-in-PKCS7_dataDecode-r.patch: removed, upstream - 0025-fix-coverity-issue-966597-error-line-is-not-always-i.patch: removed, upstream - 0001-libcrypto-Hide-library-private-symbols.patch: disabled heartbeat testcase - openssl-1.0.1c-ipv6-apps.patch: refreshed - openssl-fix-pod-syntax.diff: some stuff merged upstream, refreshed- Added new SUSE default cipher suite openssl-1.0.1e-add-suse-default-cipher.patch openssl-1.0.1e-add-suse-default-cipher-header.patch openssl-1.0.1e-add-test-suse-default-cipher-suite.patch- Add upstream patches fixing coverity scan issues: * 0018-fix-coverity-issues-966593-966596.patch * 0020-Initialize-num-properly.patch * 0022-bignum-allow-concurrent-BN_MONT_CTX_set_locked.patch * 0023-evp-prevent-underflow-in-base64-decoding.patch * 0024-Fixed-NULL-pointer-dereference-in-PKCS7_dataDecode-r.patch * 0025-fix-coverity-issue-966597-error-line-is-not-always-i.patch - Update 0001-libcrypto-Hide-library-private-symbols.patch to cover more private symbols, now 98% complete and probably not much more can be done to fix the rest of the ill-defined API. - openssl-fips-hidden.patch new, hides private symbols added by the FIPS patches. - openssl-no-egd.patch disable the EGD (entropy gathering daemon) interface, we have no EGD in the distro and obtaining entropy from a place other than /dev/*random, the hardware rng or the openSSL internal PRNG is an extremely bad & dangerous idea. - use secure_getenv instead of getenv everywhere.- 0005-libssl-Hide-library-private-symbols.patch Update to hide more symbols that are not part of the public API - openssl-gcc-attributes.patch BUF_memdup also needs attribute alloc_size as it returns memory of size of the second parameter. - openssl-ocloexec.patch Update, accept() also needs O_CLOEXEC. - 0009-Fix-double-frees.patch, 0017-Double-free-in-i2o_ECPublicKey.patch fix various double frees (from upstream) - 012-Fix-eckey_priv_encode.patch eckey_priv_encode should return an error inmediately on failure of i2d_ECPrivateKey (from upstream) - 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch From libressl, modified to work on linux systems that do not have funopen() but fopencookie() instead. Once upon a time, OS didn't have snprintf, which caused openssl to bundle a *printf implementation. We know better nowadays, the glibc implementation has buffer overflow checking, has sane failure modes deal properly with threads, signals..etc.. - build with -fno-common as well.- Fixed bug[ bnc#876282], CVE-2014-0198 openssl: OpenSSL NULL pointer dereference in do_ssl3_write Add file: CVE-2014-0198.patch- Build everything with full RELRO (-Wl,-z,relro,-z,now) - Remove -fstack-protector from the hardcoded build options it is already in RPM_OPT_FLAGS and is replaced by - fstack-protector-strong with gcc 4.9- Remove the "gmp" and "capi" shared engines, nobody noticed but they are just dummies that do nothing.- Use enable-rfc3779 to allow projects such as rpki.net to work in openSUSE and match the functionality available in Debian/Fedora/etc- openssl-buffreelistbug-aka-CVE-2010-5298.patch fix CVE-2010-5298 and disable the internal BUF_FREELISTS functionality. it hides bugs like heartbleed and is there only for systems on which malloc() free() are slow. - ensure we export MALLOC_CHECK and PERTURB during the test suite, now that the freelist functionality is disabled it will help to catch bugs before they hit users.- openssl-libssl-noweakciphers.patch do not offer "export" or "low" quality ciphers by default. using such ciphers is not forbidden but requires an explicit request- openssl-gcc-attributes.patch: fix thinko, CRYPTO_realloc_clean does not return memory of "num * old_num" but only "num" size fortunately this function is currently unused.- openssl-gcc-attributes.patch * annotate memory allocation wrappers with attribute(alloc_size) so the compiler can tell us if it knows they are being misused * OPENSSL_showfatal is annotated with attribute printf to detect format string problems. - It is time to try to disable SSLv2 again, it was tried a while ago but broke too many things, nowadays Debian, Ubuntu, the BSDs all have disabled it, most components are already fixed. I will fix the remaining fallout if any. (email me)- update to 1.0.1g: * fix for critical TLS heartbeat read overrun (CVE-2014-0160) (bnc#872299) * Fix for Recovering OpenSSL ECDSA Nonces (CVE-2014-0076) (bnc#869945) * Workaround for the "TLS hang bug" (see FAQ and PR#2771) - remove CVE-2014-0076.patch - openssl.keyring: upstream changed to: pub 4096R/FA40E9E2 2005-03-19 Dr Stephen N Henson uid Dr Stephen Henson uid Dr Stephen Henson - Fix bug[ bnc#869945] CVE-2014-0076: openssl: Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack Add file: CVE-2014-0076.patch- additional changes required for FIPS validation( from Fedora repo) Add patch file: openssl-1.0.1e-new-fips-reqs.patch- Remove GCC option "-O3" for compiliation issue of ARM version Modify: openssl.spec- Adjust the installation path( libopenssl/hmac into /lib or /lib64) Modify files: README-FIPS.txt openssl.spec- 1.0.1f: * Fix for TLS record tampering bug CVE-2013-4353 - already included: * Fix for TLS version checking bug CVE-2013-6449 * Fix for DTLS retransmission bug CVE-2013-6450 - removed patches: * CVE-2013-6449.patch, committed upstream * CVE-2013-6450.patch, committed upstream * SSL_get_certificate-broken.patch, committed upstream * openssl-1.0.1e-bnc822642.patch, committed upstream - modified patches: * openssl-1.0.1e-fips.patch, adjust for upstream changes * openssl-fix-pod-syntax.diff, adjust for upstream changes- add a gpg keyring for source tarball- Fixed bnc#857850, openssl doesn't load engine Modify file: openssl.spec- Fixed bnc#857203, openssl: crash in DTLS renegotiation after packet loss Add file: CVE-2013-6450.patch- Fixed bnc#856687, openssl: crash when using TLS 1.2 Add file: CVE-2013-6449.patch- compression_methods_switch.patch: setenv might not be successful if a surrounding library or application filters it, like e.g. sudo. As setenv() does not seem to be useful anyway, remove it. bnc#849377- Adjust the installation path. Modify files: README-FIPS.txt openssl.spec- don't own /etc/ssl/certs, it's owned by ca-certificates- Actually enable it (in a building way) for openSUSE and SLES, as we intended. - Add README-FIPS.txt from SLE 11.- Restrict the (broken beyond build) FIPS certification code to SLE releases only, it has no value in openSUSE at all.- Patches for OpenSSL FIPS-140-2/3 certification Add patch files: openssl-1.0.1e-fips.patch, openssl-1.0.1e-fips-ec.patch, openssl-1.0.1e-fips-ctor.patch- 0001-libcrypto-Hide-library-private-symbols.patch This patch implements the libcrpto part complimentary to 0005-libssl-Hide-library-private-symbols.patch. This patch is however not 100% complete, as some private library symbols are declared in public headers that shall not be touched or are defined/declared in "perlasm". (tested in 13.1, 12.3, factory) - openSSL defaults to -O3 optimization level but we override it with RPM_OPT_FLAGS, ensure we use -O3 like upstream.- openssl-1.0.1c-ipv6-apps.patch: Support ipv6 in the openssl s_client / s_server commandline app.- VPN openconnect problem (DTLS handshake failed) (git 9fe4603b8, bnc#822642, openssl ticket#2984)- Fix armv6l arch (armv7 was previously used to build armv6 which lead to illegal instruction when used)- Fix bug[ bnc#832833] openssl ssl_set_cert_masks() is broken modify patch file: SSL_get_certificate-broken.patch- Via padlock is only found in x86 and x86_64 CPUs, remove the shared module for other archs.- Cleanup engines that are of no use in a modern linux distro - The following engines stay: * libcapi.so --> usable in case you have third party /dev/crypto * libgmp.so --> may help to doing some maths using GMP * libgost.so --> implements the GOST block cipher * libpadlock.so --> VIA padlock support - Al other are removed because they require third party propietary shared libraries nowhere to be found or that we can test.- openssl-pkgconfig.patch: Here we go.. For applications to benefit fully of features provided by openSSL engines (rdrand, aes-ni..etc) either builtin or in DSO form applications have to call ENGINE_load_builtin_engines() or OPENSSL_config() unfortunately from a total of 68 apps/libraries linked to libcrypto in a desktop system, only 4 do so, and there is a sea of buggy code that I dont feel like fixing. Instead we can pass -DOPENSSL_LOAD_CONF in the pkgconfig files so the needed operation becomes implicit the next time such apps are recompiled, see OPENSSL_config(3) Unfortunately this does not fix everything, because there are apps not using pkgconfig or using it incorrectly, but it is a good start.- add openssl-1.0.1c-default-paths.patch: Fix from Fedora for openssl s_client not setting CApath by default- 0005-libssl-Hide-library-private-symbols.patch: hide private symbols, this *only* applies to libssl where it is straightforward to do so as applications should not be using any of the symbols declared/defined in headers that the library does not install. A separate patch MAY be provided in the future for libcrypto where things are much more complicated and threfore requires careful testing.- compression_methods_switch.patch: Disable compression by default to avoid the CRIME attack (CVE-2012-4929 bnc#793420) Can be override by setting environment variable OPENSSL_NO_DEFAULT_ZLIB=no- Don't use the legacy /etc/ssl/certs directory anymore but rather the p11-kit generated /var/lib/ca-certificates/openssl one (fate#314991, openssl-1.0.1e-truststore.diff)- Build enable-ec_nistp_64_gcc_128, ecdh is many times faster but only works in x86_64. According to the openSSL team "it is superior to the default in multiple regards (speed, and also security as the new implementations are secure against timing attacks)" It is not enabled by default due to the build system being unable to detect if the compiler supports __uint128_t.- pick openssl-fix-pod-syntax.diff out of the upstream RT to fix build with perl 5.18- add %if tag for BuildArch. sles may also need latest openssl.- disable fstack-protector on aarch64- Update to 1.0.1e o Bugfix release (bnc#803004) - Drop openssl-1.0.1d-s3-packet.patch, included upstream- Added openssl-1.0.1d-s3-packet.patch from upstream, fixes bnc#803004, openssl ticket#2975- update to version 1.0.1d, fixing security issues o Fix renegotiation in TLS 1.1, 1.2 by using the correct TLS version. o Include the fips configuration module. o Fix OCSP bad key DoS attack CVE-2013-0166 o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169 bnc#802184 o Fix for TLS AESNI record handling flaw CVE-2012-2686- fix bug[bnc#784994] - VIA padlock support on 64 systems e_padlock: add support for x86_64 gcc- Open Internal file descriptors with O_CLOEXEC, leaving those open across fork()..execve() makes a perfect vector for a side-channel attack...- fix build on armv5 (bnc#774710)- Update to version 1.0.1c for the complete list of changes see NEWS, this only list packaging changes. - Drop aes-ni patch, no longer needed as it is builtin in openssl now. - Define GNU_SOURCE and use -std=gnu99 to build the package. - Use LFS_CFLAGS in platforms where it matters.- don't install any demo or expired certs at all- update to latest stable verison 1.0.0i including the following patches: CVE-2012-2110.path Bug748738_Tolerate_bad_MIME_headers.patch bug749213-Free-headers-after-use.patch bug749210-Symmetric-crypto-errors-in-PKCS7_decrypt.patch CVE-2012-1165.patch CVE-2012-0884.patch bug749735.patch- fix bug[bnc#749735] - Memory leak when creating public keys. fix bug[bnc#751977] - CMS and S/MIME Bleichenbacher attack CVE-2012-0884- fix bug[bnc#751946] - S/MIME verification may erroneously fail CVE-2012-1165- fix bug[bnc#749213]-Free headers after use in error message and bug[bnc#749210]-Symmetric crypto errors in PKCS7_decrypt- license update: OpenSSL- fix bug[bnc#748738] - Tolerate bad MIME headers in openssl's asn1 parser. CVE-2006-7250- Update to version 1.0.0g fix the following: DTLS DoS attack (CVE-2012-0050)- Update to version 1.0.0f fix the following: DTLS Plaintext Recovery Attack (CVE-2011-4108) Uninitialized SSL 3.0 Padding (CVE-2011-4576) Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577) SGC Restart DoS Attack (CVE-2011-4619) Invalid GOST parameters DoS Attack (CVE-2012-0027)- AES-NI: Check the return value of Engine_add() if the ENGINE_add() call fails: it ends up adding a reference to a freed up ENGINE which is likely to subsequently contain garbage This will happen if an ENGINE with the same name is added multiple times,for example different libraries. [bnc#720601]- Build with -DSSL_FORBID_ENULL so servers are not able to use the NULL encryption ciphers (Those offering no encryption whatsoever).- Update to openssl 1.0.0e fixes CVE-2011-3207 and CVE-2011-3210 see http://openssl.org/news/secadv_20110906.txt for details.- Add upstream patch that calls ENGINE_register_all_complete() in ENGINE_load_builtin_engines() saving us from adding dozens of calls to such function to calling applications.- remove -fno-strict-aliasing from CFLAGS no longer needed and is likely to slow down stuff.- Edit baselibs.conf to provide libopenssl-devel-32bit too- update to latest stable version 1.0.0d. patch removed(already in the new package): CVE-2011-0014 patch added: ECDSA_signatures_timing_attack.patch- fix bug[bnc#693027]. Add protection against ECDSA timing attacks as mentioned in the paper by Billy Bob Brumley and Nicola Tuveri, see: http://eprint.iacr.org/2011/232.pdf [Billy Bob Brumley and Nicola Tuveri]- added openssl as dependency in the devel package- fix bug [bnc#670526] CVE-2011-0014,OCSP stapling vulnerability- Add patch from upstream in order to support AES-NI instruction set present on current Intel and AMD processors- enable -DPURIFY to avoid valgrind errors.- update to stable version 1.0.0c. patch included: CVE-2010-1633_and_CVE-2010-0742.patch patchset-19727.diff CVE-2010-2939.patch CVE-2010-3864.patch- fix bug [bnc#651003] CVE-2010-3864- fix bug [bnc#629905] CVE-2010-2939- Exclude static libraries, see what breaks and fix that instead- fix two compile errors on SPARC- -fstack-protector is not supported on hppa- fix bnc #610642 CVE-2010-0742 CVE-2010-1633- fix bnc #610223,change Configure to tell openssl to load engines from /%{_lib} instead of %{_libdir}- Do not compile in build time but use mtime of changes file instead. This allows build-compare to identify that no changes have happened.- build libopenssl to /%{_lib} dir,and keep only one libopenssl-devel for new developping programs.- build libopenssl and libopenssl-devel to a version directory- buildrequire pkg-config to fix provides- also create old certificate hash in /etc/ssl/certs for compatibility with applications that still link against 0.9.8- Disable our own build targets, instead use the openSSL provided ones as they are now good (or should be good at least). - add -Wa,--noexecstack to the Configure call, this is the upstream approved way to avoid exec-stack marking- update to 1.0.0 Merge the following patches from 0.9.8k: openssl-0.9.6g-alpha.diff openssl-0.9.7f-ppc64.diff openssl-0.9.8-flags-priority.dif openssl-0.9.8-sparc.dif openssl-allow-arch.diff openssl-hppa-config.diff- fixed "exectuable stack" for libcrypto.so issue on i586 by adjusting the assembler output during MMX builds.- Openssl is now partially converted to libdir usage upstream, merge that in to fix lib64 builds.- fix security bug [bnc#590833] CVE-2010-0740- update to version 0.9.8m Merge the following patches from 0.9.8k: bswap.diff non-exec-stack.diff openssl-0.9.6g-alpha.diff openssl-0.9.7f-ppc64.diff openssl-0.9.8-flags-priority.dif openssl-0.9.8-sparc.dif openssl-allow-arch.diff openssl-hppa-config.diff- build openssl for sparc64- add baselibs.conf as a source - package documentation as noarch- updated patches to apply with fuzz=0- fix Bug [bnc#526319]- use %patch0 for Patch0- update to version 0.9.8k - patches merged upstream: openssl-CVE-2008-5077.patch openssl-CVE-2009-0590.patch openssl-CVE-2009-0591.patch openssl-CVE-2009-0789.patch openssl-CVE-2009-1377.patch openssl-CVE-2009-1378.patch openssl-CVE-2009-1379.patch openssl-CVE-2009-1386.patch openssl-CVE-2009-1387.patch- fix security bug [bnc#509031] CVE-2009-1386 CVE-2009-1387- fix security bug [bnc#504687] CVE-2009-1377 CVE-2009-1378 CVE-2009-1379- fix security bug [bnc#489641] CVE-2009-0590 CVE-2009-0591 CVE-2009-0789openssl-develpkgconfig(libcrypto)pkgconfig(libopenssl)pkgconfig(libssl)pkgconfig(openssl)lamb16 15393457171.1.0i-lp151.1.11.1.0i1.1.0i1.1.0i1.1.0i1.1.0i1.1.0i1.1.0i1.1.0i1.1.0i1.1.0ilibopenssl-develREADME.SUSE/usr/share/doc/packages//usr/share/doc/packages/libopenssl-devel/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Leap:15.1/standard/534fcdef3bc24bc042aecdf86378ba87-opensslcpioxz5noarch-suse-linuxdirectoryASCII text;_f+g)<̻utf-84376f353ab883197b7765423aa9eed9933310d64054c26f8cedae47c16bc128e? 7zXZ !t/$] crt:bLL Dx.TSDQnS qq+ VlI?)gXQa%k[3x`%i75*j*JDKYK:u:@~x?Yp!*AjsK{$@0P8eWr3D?oN!JOGOP웩(cP #-qqu2.=hNA\ YZ