ecryptfs-utils-devel-111-2.31 >  A [bp9|yl!ZB@*Bϙ xm~p6bHi4Ztغbck.<1TzXZ2~5Bz19YzHt^Q[@{ܓjyL1C0DڭEnwse<{&OX$Bkꢁ'rmgρ`'y !CǣPNW֪Y7ea6f1d13c3bc414c62d2fecd6f324d3c1010657b21560dbb3f44319d473a16384efe269e584a3364905e2afcb3083bd56a75891p> |? ld  Etx $0 6 < H  0<$(E8L9:FGHIX Y\0]<^ebc>defluvwxy z    & hCecryptfs-utils-devel1112.31Development files for ecryptfs-utilsA stacked cryptographic filesystem for Linux.[WnebbioloUSUSE Linux Enterprise 15SUSE LLC GPL-2.0https://www.suse.com/Development/Languages/C and C++http://ecryptfs.org/linuxppc64leT;Ɓ[[[b8a758a4b65ad1abaecc2d18a5c3a9b20dcc6e22a69cdcef6d1c668651b078bc37668a1fd15a8ffe4bc2b8f9c5071fcef635f11905d86c659b347e1b4a055dcalibecryptfs.so.1.0.0rootrootrootrootrootrootecryptfs-utils-111-2.31.src.rpmecryptfs-utils-develecryptfs-utils-devel(ppc-64)pkgconfig(libecryptfs)@    /usr/bin/pkg-configlibecryptfs1rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1113.0.4-14.6.0-14.0-15.2-14.14.1Z_@Z Z@Z@XCVvV"8@VqV UPTT@SR QOjO@O0@O O~Or@N@Nx@Nu@NC@M'Kh@KKepJCfmeissner@suse.commeissner@suse.comvcizek@suse.comvcizek@suse.comsfalken@opensuse.orgmeissner@suse.commpluskal@suse.commpluskal@suse.commpluskal@suse.commeissner@suse.comdarin@darins.netfcrozat@suse.comdarin@darins.netdarin@darins.netmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comdarin@darins.netmeissner@suse.comcoolo@suse.commeissner@suse.dejengelh@medozas.demeissner@suse.demeissner@suse.deaj@suse.demeissner@suse.dejengelh@medozas.desbrabec@suse.cz- drop python2 support (needs to be replaced by python3 support) (bsc#1081587)- The license is GPL-2.0 (without + / or later)- Update to 111 * upstream provides no changelog - add ecryptfs-utils-openssl11.patch to support build with OpenSSL 1.1 (bsc#1066937)- drop validate-mount-destination-fs-type.patch (upstream)- Edited %files section to clear unpackaged files builderror in openSUSE:Factory- validate-mount-destination-fs-type.patch: A local user could have escalated privileges by mounting over special filesystems (bsc#962052 CVE-2016-1572)- Update to 108 * This release does not have a changelog.- Do not ship .la files- Cleanup spec file with spec-cleaner - Update autotool dependencies - Split library and devel packages - Use desktop file macros - Use fdupes to reduce duplicities- updated to 106 - new passphrase wrapping method, including the salt to fix CVE-2014-9687 / bsc#920160 - various bugfixes- update to 104 - lots of bugfixes, apparently from static code checking- Drop ecryptfs-correct-desktop.patch and ensure ecryptfs-mount-private.desktop is properly generated and installed in a program specific location (ecryptfs-setup-private will take care of creating the right symlink) and not in /usr/share/applications by default. - Add ecryptfs-mount-private.png (from Fedora) - Create tmpfiles.d to ensure ecryptfs module is autoloaded at start. - Fix category on ecryptfs-setup-private.desktop.- fix %postun to not run pam-config on update (bnc#814098, bnc#834993)- update to 103 - move -pie/-fpie into separate patch - update ecryptfs-setup-swap-SuSE.patch for systmd and fstab without UUID lables - remove ecryptfs-utils.security.patch, fixed upstream - add PreReq: permissions - removed unpackaged doc- also supply MS_NODEV to avoid exposing device files if someone got them on the encrypted media.- point the desktop link to the right .desktop file - build mount.ecryptfs_private with -pie/-fpie- hook pam_ecryptfs into pam session and auth bnc#755475- added security improvements to mount.ecryptfs_private and pam_ecryptfs (bnc#740110)- patch so ecryptfs-setup-swap executes boot.crypto- updated to 96 - bugfixes - testsuite added - ecryptfs-verify utility added - write-read test utility - mark /sbin/mount.eccryptfs_private as setuidable (bnc#745584 , bnc#740110)- add libtool as buildrequire to make the spec file more reliable- Updated to 92 * Fix umask issue introduced by last security update * some bugfixes- Remove redundant/obsolete tags/sections from specfile (cf. packaging guidelines) - Put make call in the right spot - Use %_smp_mflags for parallel build- Updated to 90 Fixed several security issues: * CVE-2011-1831 - Race condition when checking mountpoint during mount. * CVE-2011-1832 - Race condition when checking mountpoint during unmount. * CVE-2011-1833 - Race condition when checking source during mount. * CVE-2011-1834 - Improper mtab handling allowing corruption due to resource limits, signals, etc. * CVE-2011-1835 - Key poisoning in ecryptfs-setup-private due to insecure temp directory. * CVE-2011-1836 - ecryptfs-recover-private mounts directly in /tmp * CVE-2011-1837 - Predictable lock counter name and associated races. New ecryptfs-find binary to find by inode.- Updated to 87 * src/utils/ecryptfs-setup-private: update the Private.* selinux contexts * src/utils/ecryptfs-setup-private: - add -p to mkdir, address noise for a non-error - must insert keys during testing phase, since we remove keys on unmount now, LP: #725862 * src/utils/ecryptfs_rewrap_passphrase.c: confirm passphrases in interactive mode, LP: #667331 - Updated to 86 * src/pam_ecryptfs/pam_ecryptfs.c: - check if this file exists and ask the user for the wrapping passphrase if it does - eliminate both ecryptfs_pam_wrapping_independent_set() and ecryptfs_pam_automount_set() and replace with a reusable file_exists_dotecryptfs() function * src/utils/mount.ecryptfs_private.c: - support multiple, user configurable private directories by way of a command line "alias" argument - this "alias" references a configuration file by the name of: $HOME/.ecryptfs/alias.conf, which is in an fstab(5) format, as well as $HOME/.ecryptfs/alias.sig, in the same format as Private.sig - if no argument specified, the utility operates in legacy mode, defaulting to "Private" - rename variables, s/dev/src/ and s/mnt/dest/ - add a read_config() function - add an alias char* to replace the #defined ECRYPTFS_PRIVATE_DIR - this is half of the fix to LP: #615657 * doc/manpage/mount.ecryptfs_private.1: document these changes * src/libecryptfs/main.c, src/utils/mount.ecryptfs_private.c: - allow umount.ecryptfs_private to succeed when the key is no longer in user keyring. - Updated to 85 * src/utils/ecryptfs-recover-private: clean sigs of invalid characters * src/utils/mount.ecryptfs_private.c: - fix bug LP: #313812, clear used keys on unmount - add ecryptfs_unlink_sigs to the mount opts, so that unmounts from umount.ecryptfs behave similarly - use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek * src/utils/ecryptfs-migrate-home: - support user databases outside of /etc/passwd, LP: #627506 - Updated to 84 * src/desktop/ecryptfs-record-passphrase: fix typo, LP: #524139 * debian/rules, debian/control: - disable the gpg key module, as it's not yet functional - clean up unneeded build-deps - also, not using opencryptoki either * doc/manpage/ecryptfs.7: fix minor documentation bug, reported by email by Jon 'maddog' Hall * doc/manpage/ecryptfs-recover-private.1, doc/manpage/Makefile.am, po/POTFILES.in, src/utils/ecryptfs-recover-private, src/utils/Makefile.am: add a utility to simplify data recovery of an encrypted private directory from a Live ISO, LP: #689969- Fix build with adding requires on mozilla-nss-devel and python-devel. - Fix package list.- Updated to 83 - lots of bugfixes - improvements- Package baselibs.conf- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).nebbiolo 1527295831111-2.31111-2.31111ecryptfs.hlibecryptfs.solibecryptfs.pc/usr/include//usr/lib64//usr/lib64/pkgconfig/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:SLE-15:GA/standard/e91efb3311854dc7b1627e5041556517-ecryptfs-utilscpioxz5ppc64le-suse-linuxC source, ASCII textpkgconfig filePRi^|?*|Ĩutf-84d9766256670c9627070c84a85e986d0e0ba752fbd4838e289a430cb17d834d9? 7zXZ !t/W;] crv(vX0|ݳZV$NgEA$pw͌nڈOǫŐ6"&6%#̆`T{D[}L0݇4j~& _4؃i~$!8 16Md\ lg.U=tF7#+b@JωHdxPHC`$l'U %(f5oy+;fr֛m*FWNt‚-Udk֯c?֊(i`zb"ڀv.*c /p9|= o+Ssi4sW;~$E2Yu"j~Zib P|tq-q(#yF`ddG uA2f0^6=׫[KikܫD;Z cA0TP)6^^[v98&U;ʶ& T7zJ鷬hNn1':w#I3Sd'Xul͘9G7wbbeJli- c:a  B5,]ib䄼5J"BSZ*ꊀdKL;?V0mK^Iϓxoܹ5ʕ5~!8hdR$ HxsDqfIBߎyfWZۄ>Gl>iOc >UXPLŽJS/{ew>m=xx>J~AH0;'p;VωgCOpI^t$u `2.K*{?z_d?arf($0oղ(roVߕcw%VzS sQKI`! aYfdr(ڸ /Ik,y'V4k&lJCi=LLkK]g"ԉ֥鉹,5'`qse.am!&KU$aOOG]]T1 <u:4 |}:5\s=1&ֆDM3eB-0&@nZ{!qɆ|$T^ciE(y`r.iTiDk:-2ǖzk!w9m 9F"Ȯ4Cːf0yM/yߺD[zD~vwkE CCukIy,ypհT,EfeȩuZ +(u)||M#@X d)rt.J`:UM!|@[.ÄDHAP-{]68;ϡU|+rggT-ð޵Z"`@CG4)soſ{w)"lAӥ2Ρl" ٹ˷QsxvڍzUp)`1ڡed#WvƢ`nqRGlAy`u}Ϗ9L@1(֨dy_{:ΕdiIi%:8}j+H\t˓r,ii9);OYyˌKfGgp;MgTf_V#x = *r'S.o~zFHWNuy[!o [{y?*9Z+ !'8lty?uX'^ Bs}U_l"fgQ3Nǜ@LT!)~^Tţ ~nN: 8P}{5idI#Ͱ=Y%&_0C>ȥ9fb$vTFk9>ɭf.RcH\ Û,`KCch?U/GI6'$vC P-<9;9KNw{up9%hձ -ZGI 4tPeU!SS'- N ɔ87q.'Cr{5ƪjBnsᣢ]J^tz]X_I[_ w]H=[F,r,:c,< 7l@4y޸ +Td@\GsHġY2NH35zHiE Q_9ny\d. ;Xdn/_dYgX|VcU52>A SQ\[\YZso'3C(lÊ$DkNZ;0g(CD+֣$pԖU͝1n[' UHUI ٪մ-'\< J'E0#Gz}%726&ORՅzp`)p';k{3E8W]JayϪ~YEظ vH2f9Xͫ)y]&n?yܛQ1"$ŅیH 곟n`0I5N"in$\5@~^,k<s[I3'._Ob*ڰοKZ@BDf-3W Ok4E:jDY2jdxғNm'ZdiVn~Aُ>E7aQ]rfF(}u 19Sǚeɂ˘m3`hq٣߭a9.?CNkǐjdEĒ΃4 ⓵qalAʌOKLX.mԂ] q,w2zp +p|M|Q8g{QQBNnք!;>5)&N><^d0TdI6iI$ *\q+^ǒ㠙 QEAB᭸ed&:VEEU } )֌\MUӍ"!~28Rŏ.xDDs_Zq_r!Ohy7;[qL*,Hn^, @4bHFi}wFmxL :%n08F,۪Q9)iƭ N.Ҭ3zt21@4|-A{nJgP;ܩI:E|]D@թgnSZ<%Žm`&!ib|'lN^>EpjKi\:D>TDR@vSLĄRNe-67W/i2;"OM,GA[f7F;R#MHM`~;LJ.haH|$=^ky8}&;ui4q*2n`uT+4μI18G\=B7 1;2' F v)s %xq|i2}\$L; &CE1mL l]~eu+ƖPljcAb5HR.:uI5{p"+Kaݭ eq1iߚ%Q5=3賧!sTҢVwJR2~7oQ! @{:x޳O7>bj.8*seıs߹m0gV\ζu(ܷ9P6h'l>ˎoiրދɮ+1y=%4IY~uz$,ܪ@x/MzA!J^O>ev?rB).JC@UH0ZkҶ{"QG+ǏozD4dGqc8z oDtzź0~I&}7N;^:HfYW8\ߪ>o'̀|J'pf?-p%ʇ~_ٝX_ܫӿs'TUNQ:)݀n(4`|lՈ Ŗ=7йi-u@~?xѽ.*#2!(&'4j`D A{/} YZ