ecryptfs-utils-devel-32bit-111-lp152.4.5 >  A ^ɸ/=„0-d.8$N0{Ue5*$nv@G=ʻqpM|qFeC9׮6 R^@U]R/EASNSG/q{ GE\|EuwS#* CП$yK;L7 =UA;dYoaP^HF/O!ϢGKPKUG!\jEǣ}`( f,MTFrFO!PaIj<*VD&?V187fd598ffc335f15ff2c637912f644126bbb980854f1e4cc85afe58feb62076ccffabb520fd0b3d4db24a422edde5eb6b72ac90 T^ɸ/=„*#r_T-NcKVzȜ7:{͠VLs͓s+u=*%`7PMj*# /^9x庍:r%=4*h_4j((>,8z- ٰԢ9gd4w]Nd3Cї(r3s]W峦i@;;_ddeQ(54i2Qi.pxX*|薅8Z3) [ơ0)DvjjDwia$Қ>p9 ?d! + P       48=BhlO(s8| 9 :W G HIXY \<]@^ObYcd|efluvCecryptfs-utils-devel-32bit111lp152.4.5Development files for ecryptfs-utilsA stacked cryptographic filesystem for Linux.^lamb06openSUSE Leap 15.2openSUSEGPL-2.0https://bugs.opensuse.orgDevelopment/Languages/C and C++http://ecryptfs.org/linuxx86_64^libecryptfs.so.1.0.0rootrootecryptfs-utils-111-lp152.4.5.src.rpmecryptfs-utils-devel-32bitecryptfs-utils-devel-32bit(x86-32)    ecryptfs-utils-devellibecryptfs1-32bitrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1111113.0.4-14.6.0-14.0-15.2-14.14.1Z_@Z Z@Z@XCVvV"8@VqV UPmeissner@suse.commeissner@suse.comvcizek@suse.comvcizek@suse.comsfalken@opensuse.orgmeissner@suse.commpluskal@suse.commpluskal@suse.commpluskal@suse.commeissner@suse.com- drop python2 support (needs to be replaced by python3 support) (bsc#1081587)- The license is GPL-2.0 (without + / or later)- Update to 111 * upstream provides no changelog - add ecryptfs-utils-openssl11.patch to support build with OpenSSL 1.1 (bsc#1066937)- drop validate-mount-destination-fs-type.patch (upstream)- Edited %files section to clear unpackaged files builderror in openSUSE:Factory- validate-mount-destination-fs-type.patch: A local user could have escalated privileges by mounting over special filesystems (bsc#962052 CVE-2016-1572)- Update to 108 * This release does not have a changelog.- Do not ship .la files- Cleanup spec file with spec-cleaner - Update autotool dependencies - Split library and devel packages - Use desktop file macros - Use fdupes to reduce duplicities- updated to 106 - new passphrase wrapping method, including the salt to fix CVE-2014-9687 / bsc#920160 - various bugfixes111-lp152.4.5111-lp152.4.5libecryptfs.so/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Leap:15.2/standard/e91efb3311854dc7b1627e5041556517-ecryptfs-utilscpioxz5x86_64-suse-linuxutf-8173f5ee278b159524dbf6a6acc85271c1eb6094a212294cf846bbcdf0704ad2e?p7zXZ !t/Z] cr$x#*[E"+; {<$\+ݯ&F3 l) ^;ҦI6KWAk<4`.f'a=T5 ! YZ