ca-certificates-2+git20170807.10b2785-lp152.8.2 >  A ]9/=„&Pqdm#zdD.~X|/h0 %2pj9 nl[>k2VCH_YG"k(k+'JݸnZ1.T?.Ue*v91!AwQuFE?2G #I1ˑeMʶO:~k$D!$?CsE#OT>ْP[L\g`[f1[lmIKFtDۑ!ӫ\|2>M.'+تAV5?qc53acca50f98a36a531175619fbb493a290ed427ad32ae512cd841fbc6c35acba457cd5cce914c09f608bbf621b1452a06a1ee9f^̉]9/=„ٺ|aH MEStD w\;S7<ɮWjwfK h]Lԫ7V.%>R Q*Q-y=iiQݿxuL B'6 o(2|bŬ꽁TDRr\>S_i:T!ƪװFRؗ9C0ѐ-n GվA3A?/N ʅLPT86 w Bz-qNv4%&Uhosr xW>pL/?.d( 2 h $,0CL] w [  p      p    |   <t \ :( h8 p 9 :!W =%>%?%@%B%F%G% H&\ I& X&Y'Z'D['L\'P ]' ^)^b*c+d+e,f,l, u, v,w-` x- y.`z.t.......Cca-certificates2+git20170807.10b2785lp152.8.2Utilities for system wide CA certificate installationUpdate-ca-certificates is intended to keep the certificate stores of SSL libraries like OpenSSL or GnuTLS in sync with the system's CA certificate store that is managed by p11-kit.]9lamb10p'openSUSE Leap 15.2openSUSEGPL-2.0-or-laterhttps://bugs.opensuse.orgProductivity/Networking/Securityhttps://github.com/openSUSE/ca-certificateslinuxnoarch# migrate /etc/ssl/certs to a symlink if [ "$1" -ne 0 -a -d /etc/ssl/certs -a ! -L /etc/ssl/certs ]; then # copy custom pem files to new location (bnc#875647) mkdir -p /etc/pki/trust/anchors for cert in /etc/ssl/certs/*.pem; do test -f "$cert" -a ! -L "$cert" || continue read firstline < "$cert" # skip package provided certificates (bnc#875647) if test "${firstline#\# generated by }" != "${firstline}" || rpm -qf "$cert" > /dev/null; then continue fi # create a p11-kit header that set the label of # the certificate to the file name. That ensures # that the certificate gets the same name in # /etc/ssl/certs as before bn="${cert##*/}" ( cat <<-EOF # created by update-ca-certificates from # $cert [p11-kit-object-v1] class: certificate label: "${bn%.pem}" trusted: true EOF cat $cert ) > "/etc/pki/trust/$bn" done mv -T --backup=numbered /etc/ssl/certs /etc/ssl/certs.rpmsave && ln -s /var/lib/ca-certificates/pem /etc/ssl/certs fi test -n "$FIRST_ARG" || FIRST_ARG="$1" # disable migration if initial install under systemd [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$FIRST_ARG" -eq 1 ]; then for service in ca-certificates.path ca-certificates.service ; do sysv_service="${service%.*}" touch "/var/lib/systemd/migrated/$sysv_service" || : done else for service in ca-certificates.path ca-certificates.service ; do # The tag file might have been left by a preceding # update (see 1059627) rm -f "/run/rpm-ca-certificates-update-$service-new-in-upgrade" if [ ! -e "/usr/lib/systemd/system/$service" ]; then touch "/run/rpm-ca-certificates-update-$service-new-in-upgrade" fi done for service in ca-certificates.path ca-certificates.service ; do sysv_service="${service%.*}" if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --save $sysv_service || : done fiif [ -s /etc/ca-certificates.conf ]; then while read line; do [ ${line#\!} != "$line" ] || continue cert="${line#\!*/}" ln -s /usr/share/ca-certificates/anchors/"$cert" /etc/pki/trust/blacklist done < /etc/ca-certificates.conf echo "/etc/ca-certificates.conf converted and saved as /etc/ca-certificates.conf.rpmsave" mv /etc/ca-certificates.conf /etc/ca-certificates.conf.rpmsave fi # force rebuilding all certificate stores. # This also makes sure we update the hash links in /etc/ssl/certs # as openssl changed the hash format between 0.9.8 and 1.0 update-ca-certificates -f || true test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" -a -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -eq 1 ]; then if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl preset ca-certificates.path ca-certificates.service || : fi elif [ "$FIRST_ARG" -gt 1 ]; then for service in ca-certificates.path ca-certificates.service ; do if [ ! -e "/run/rpm-ca-certificates-update-$service-new-in-upgrade" ]; then continue fi rm -f "/run/rpm-ca-certificates-update-$service-new-in-upgrade" if [ ! -x /usr/bin/systemctl ]; then continue fi /usr/bin/systemctl preset "$service" || : done for service in ca-certificates.path ca-certificates.service ; do sysv_service=${service%.*} if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --apply $sysv_service || : touch /var/lib/systemd/migrated/$sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable ca-certificates.path ca-certificates.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop ca-certificates.path ca-certificates.service ) || : fiif [ "$1" -eq 0 ]; then rm -rf /var/lib/ca-certificates/pem /var/lib/ca-certificates/openssl fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart ca-certificates.path ca-certificates.service ) || : fi else # package uninstall for service in ca-certificates.path ca-certificates.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi fi&: o FWAAAAAAAA큤A큤A큤AAAAA큤AmAm]9]9]9]9]9]9]9]9]9]9]9]9]9]9]9]9]9]9]9Yq]9Yq]9]9]9]9]9]9]9]9]9]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-certificates/ca-bundle.pem/var/lib/ca-certificates/pemservice@@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootca-certificates-2+git20170807.10b2785-lp152.8.2.src.rpmca-certificatesjava-ca-certificates@ @     /bin/bash/bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/perlcoreutilsopensslopenssl(cli)p11-kitp11-kit-toolsp11-kit-toolsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.23.13.0.4-14.6.0-14.0-15.2-14.14.1[:@ZZ2gZ*~Z@YV@YGVC-U@UQT^Jason Sikes kukuk@suse.dekukuk@suse.dekukuk@suse.comkukuk@suse.delnussel@suse.dekukuk@suse.delnussel@suse.delnussel@suse.delnussel@suse.deLed - Changed "openssl" requirement to "openssl(cli)" * (bsc#1101470)- Use %license instead of %doc [bsc#1082318]- Revert last change since we fixed systemd-preset-branding and this requires is no longer needed.- Re-add systemd requires, else package will be installed to early and services never enabled [bsc#1071776].- Don't require systemd, since we could be used in environments like container images, where we don't have systemd. If systemd is installed the systemd units will be used, else they are not needed.- Update to version 2+git20170807.10b2785: * Check TRANSACTIONAL_UPDATE is set (boo#1045942) * Add systemd units- Run update-ca-certificate by systemd unit when the content of one of the paths changes. Needed for read-only root and/or transactional updates.- Update to version 2+git20151110.c15593c: + set proper umask (boo#948724)- require p11-kit-tools >= 0.23.1- Update to version 2+git20150324.e3ee392: + p11-kit 0.23.1 supports pem-directory-hash now - use service file to generate tarball- fix bashism in postun script/bin/sh/bin/sh/bin/sh/bin/shjava-ca-certificatesopenssl-certslamb10 1569012136  2+git20170807.10b2785-lp152.8.22+git20170807.10b2785-lp152.8.21 ca-certificatesupdate.dpkitrustanchorsblacklistca-bundle.pemcertsca-certificatesupdate.d50java.run70openssl.run80etc_ssl.run99certbundle.runca-certificates.pathca-certificates.servicercca-certificatesupdate-ca-certificatesca-certificatesREADMEca-certificatesCOPYINGupdate-ca-certificates.8.gzpkitrustanchorsblacklistca-certificatesca-bundle.pemjava-cacertsopensslpem/etc//etc/ca-certificates//etc/pki//etc/pki/trust//etc/ssl//usr/lib//usr/lib/ca-certificates//usr/lib/ca-certificates/update.d//usr/lib/systemd/system//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/ca-certificates//usr/share/licenses//usr/share/licenses/ca-certificates//usr/share/man/man8//usr/share//usr/share/pki//usr/share/pki/trust//var/lib//var/lib/ca-certificates/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Leap:15.2/standard/7d38ee47271d61ab00856ea0e17f4a45-ca-certificatescpioxz5noarch-suse-linuxdirectoryBourne-Again shell script, ASCII text executablePerl script text executableASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)emptyRRRRRp@O!Ni}ca-certificates-mozillautf-8ee7dbbd452876cf8d749124c70ef89055bc752579703d58378ceed89ea83914c?@7zXZ !t/*] crt:bLL "p.,JY]RierƂkFС7 ȯf W6&l;%~z5c (SIЇm0?ASZV^QjRޠBVE;|`_]8Bq1dJB(%*c=9 3FǪ"?*vvP1lSqPwfSt!GjGiy%)fll={3 )2X/I.צF5Y:c|W*Z TQ)1w&3J'A^{; Rx NGUKu\DboDN'b?d6:+ko{\<|Pe퀚 rL%Nx-*vSw޶`y+u6[cg6W%]90+HDlsDYsh Mb׷Će_l(gg ǟaPVK)iKO =T3;NÃ]>r`kQe̠[OcD&v*+ӽYN91"Oh~_&v`lyR_q_%-a]$iMzɸ:w%|3(K+14_O:K- rwZ̢>͛Cg<9ZxaʒPsjnBNHJ 4V'VYtB~|9OU)Ն\Ùʆ00hi(uJkp/h?Ċ`Ix=3V@;Rkp0Wl Ȯ.uh/V/! v}EǬHV븏1BMЂ0koɒj P3TQY_>Vtȍ3z3//[x[*8nr "Rwÿ@UhcZ-k h:/-R|khGp`DZ2:",Ua0N<ð@vBNm>J9~ jka]\Bi15+\-qt&zac)d=H_EN a4v|]QU[GT>3wӸ@V@L\`Jը0Ciam,cH%ӎ*bƳEwGSM򲴏pfވOdC@S+eV y,?ùCfVw\#;6,,˧ ^8;Wxߎ*뤳g8ŸDN;J[KJYw#6뱳(:2Hkx靷#N?"48 uy%}\>=5ۏh׹rt,Ξ!'~I!WqWwm#&N~IȮEYf>RI \P Wr3;6E e?YK0EZX Qo UԲ_Ytxݷ ƾNq6] t@95HX(w'@gO7/HGIփ;n2%\MU *)1lmE36)i\_;|" c 5.H*B̍.K$x`cW%*i?ط_O杣b{t!@?7y3r`Jvjj}\{M.&nSi@ ||y|GcV_lܝ=k9r"Qͬ|arه;&g}_#ͯqW>LCHCᝉ!Ƚ1 nGKIvn)/%W˃<̯h:;}s`SmQj*͡'pptGdr3f.n Y~xϴԶ#vd[c3]x"|VѶ~hjyg$gc#z*F@ӻb>QlZOM@KNQ/FSKӞ}N*aih`|W:-L[9Ŗ2"Z,9VbZ^ 3Rf43~1ЗMYЙWxG~[5#ҟo9Xר7ՠC=qoWQb xфǫsZc`X|MRVŪcFPu3L[\I4k/0 xג'%;޸fr>{z+Sw=:\RKeRƦ? _qYĽoZWrY= V8$/}}PլSʲ֊Gk*_ph6 IJa.0ύS "ĆAH;4"oF "[NKOD,qthkh5nxPĀo8:O!f_:'۩0e%;[_yJw&El+ ^(,; LKqnzW _hn89 (w&A:gy'Gwieg:Íq7@ e=PL"=Gq>1 0 hzFe!p$n[?$繅x5Br9(UAGm# FswKg'ϫp{zRx:u:<Ʋ? : 3c^&Ҙb!Ǚ\3^x" /@yA,uL g'[U,'ȓ͉28;|Mo|u_w(虡17 cO=q^ũ%Pj ,v,%jÈA~^y B9iL7zJ!@7}<[p""-'w3-Q@=[ CVS̔m)Åtg~E^"D73&s+byTh"Aydz:lrY[&((4qNh&q68y1 1ȊCrߦ@}Kai7 d\ rD.Z!w||KA Cemj39ܙ|xlXOGnӾtèb ز]b>r/7A} tԜ '}S'7-3]l$(24q*tLOzRX5t,-BњlA!,+:"Tռ VqV+Y.]A9\87+`o>ww;EXdUe\EFzb2 *Q1i0³c^rڶ@8ZrGt",7݋[S0a 1 ,;v" ٻ"zQTk8lwm;9K4ٍ-ώ?=Bu͔ڛYbyxIq}ezDq*-RԺ +k$)c9$VJZJ:KSpZ_6t+mnaFr8\h$x޳=vp.ߦ7E+_}WoAB_BmH9u76oƘŧ=`x$dZfZ ,ʧ>+:OQ[vXox''-$Ol">U S/χf9b9 2>!AO#'(JZNxtV Lg\x[;3fF:1At9pE6<_g;9z[*n~^g?84g޺C[JPǸDڢ>*[T%8E$!vM,JhghC93i-PvuKsެ.*A49ZyV$Y#^OB?I2A,pV}*ft\Yu8KۺuɈWUm3ڸEh1vGC?ɂU.S*~FVV)L@*\?ٺXDver *q֊ZbXJ 03 ' _C@܏Q"Ƽ4WMbO.@̓ڢ 7JN9tF`Z7<} #m@_zΪS#xԀWc-XnA-rR<㹉޼5W㢳<VbxVsIu u9ڟ@'\&+{3,X1< G[+{i7 H5H`%Vp CBYCy/#([>}|& .v%* NY)#aȒ ^q \`]Ja ]_+終EѾpDtNT󊨤tۖW,wރr$S;y)27hf&7 ]4IȃڌũdS+3xW"3Z!t; x?}}goXrQ~k'aT}iHۆ۸Oh_a*3m&!r \fÛH x# ^{n*BLO,Џ_q)# 9eFj+> |$qZ! };ܓ?XԠigH0xʬ2׀oD59'kڼN̄;қSs@ v59 D'>xZa:.fw>'hRvP򖺡8ҭHxW4qڄL_ݹ>EK3f%gRWƿB7uAQ) "ä ~UW*L^1`y Y d~C}:yJ:<,YΧOTA՝{Y ,͵=\+E[V|;/_HݼdCLBu_uPʉ/|iM?)8 Zf_l5ԨKfu|\Ln F=?o{&L024I?rGcTpW,瑓FC^m4[ka~R#s8\}{r(tc=jϷq-]v.X<;k.8 ճBE 5c[*a4ӧYѵ&%_ (EQB<ЌdBLi?[FDrbt?Q`N7S{ͼD }ЧRj.~ez[#)$6} c#G׹iù$\N &CVF^P3DxX!F=k7H7u5٪[&g,>k.+uXS@t@)\ىE ]FJt|yP礮W.y<݇&'Yݪ;"XO-J2O?c:'QMr0gDa7z)%Ď^#Է8;-5`XYdAwyM gc7@r]/6uJ@2e;jƠ3fk96.yŷ@(Ia0O羝m. I奛Z9oYgb [rP+Wu⻈Q -p9L uكG[y`,-ѕbj# ?[c巪f(vf!\ˆ+BP0аx,A=zSyDCvxWSdcC f5v0|M.sUZan2%^QUE{vn}_!tφɗ1/3OE4n.}$d~uٟ~`Eqe1@.הܫҭe{YXyKB{V:TdZ Sijj0# 'cOPQB ;UMPBf|ٔn?yx2vtI\^D .:&@Ũ>iuW59Pi#0&~VhڟœyHH2􅿜`I*7Xާyl^u y%⎦ /)BBޓ3}6xUjU#YݽKnt)L:Sm@}~+b@2Sd1YcL"M<\l|H,cWԜ<9.{cnĚ읮wU%VcݩBLLju~ ²J[UL[(/7'(UEڱnhO=BEOh _*#ZʕĆ_0y 9tyS؞x %jA3\pka.$>ƃ'sЗG,PϣQ,&2 th0>AM Tr횗Td/ Cy^0g/Hߗ#$crr}X%W5Kl?.WP6Re,e-Z(,Pzҿs rbiQ!| "O] {roB}t"%Jq BP`A!74u5ƄOUYAI:[QQ}RG "كazc%x(wOt6{a<{"rQ$e 11th9Ia&7Frp~̈剛 8k(\BU!jk YZ