ecryptfs-utils-devel-111-2.31 >  A [p9|h y^,<݅s 0A%:i٩ď3 Y @Z1+ër|神Ũ^.Ghk #LcEe2V|/4dA~GEJ9aeH&{ӇzThaM!{lO֪jZVp66` ,h!7sVS CsCI;AdPIxeӱ*ӯ_3kU9Qy;5QhAq.BRO-W<>p> x? hd  Etx  , 2 8 D   ,8 (A8H9:FGHIXY\,]8^abc:defluvwxy z    " dCecryptfs-utils-devel1112.31Development files for ecryptfs-utilsA stacked cryptographic filesystem for Linux.[sheep11USUSE Linux Enterprise 15SUSE LLC GPL-2.0https://www.suse.com/Development/Languages/C and C++http://ecryptfs.org/linuxx86_64T;Ɓ[[[b8a758a4b65ad1abaecc2d18a5c3a9b20dcc6e22a69cdcef6d1c668651b078bc37668a1fd15a8ffe4bc2b8f9c5071fcef635f11905d86c659b347e1b4a055dcalibecryptfs.so.1.0.0rootrootrootrootrootrootecryptfs-utils-111-2.31.src.rpmecryptfs-utils-develecryptfs-utils-devel(x86-64)pkgconfig(libecryptfs)@    /usr/bin/pkg-configlibecryptfs1rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1113.0.4-14.6.0-14.0-15.2-14.14.1Z_@Z Z@Z@XCVvV"8@VqV UPTT@SR QOjO@O0@O O~Or@N@Nx@Nu@NC@M'Kh@KKepJCfmeissner@suse.commeissner@suse.comvcizek@suse.comvcizek@suse.comsfalken@opensuse.orgmeissner@suse.commpluskal@suse.commpluskal@suse.commpluskal@suse.commeissner@suse.comdarin@darins.netfcrozat@suse.comdarin@darins.netdarin@darins.netmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comdarin@darins.netmeissner@suse.comcoolo@suse.commeissner@suse.dejengelh@medozas.demeissner@suse.demeissner@suse.deaj@suse.demeissner@suse.dejengelh@medozas.desbrabec@suse.cz- drop python2 support (needs to be replaced by python3 support) (bsc#1081587)- The license is GPL-2.0 (without + / or later)- Update to 111 * upstream provides no changelog - add ecryptfs-utils-openssl11.patch to support build with OpenSSL 1.1 (bsc#1066937)- drop validate-mount-destination-fs-type.patch (upstream)- Edited %files section to clear unpackaged files builderror in openSUSE:Factory- validate-mount-destination-fs-type.patch: A local user could have escalated privileges by mounting over special filesystems (bsc#962052 CVE-2016-1572)- Update to 108 * This release does not have a changelog.- Do not ship .la files- Cleanup spec file with spec-cleaner - Update autotool dependencies - Split library and devel packages - Use desktop file macros - Use fdupes to reduce duplicities- updated to 106 - new passphrase wrapping method, including the salt to fix CVE-2014-9687 / bsc#920160 - various bugfixes- update to 104 - lots of bugfixes, apparently from static code checking- Drop ecryptfs-correct-desktop.patch and ensure ecryptfs-mount-private.desktop is properly generated and installed in a program specific location (ecryptfs-setup-private will take care of creating the right symlink) and not in /usr/share/applications by default. - Add ecryptfs-mount-private.png (from Fedora) - Create tmpfiles.d to ensure ecryptfs module is autoloaded at start. - Fix category on ecryptfs-setup-private.desktop.- fix %postun to not run pam-config on update (bnc#814098, bnc#834993)- update to 103 - move -pie/-fpie into separate patch - update ecryptfs-setup-swap-SuSE.patch for systmd and fstab without UUID lables - remove ecryptfs-utils.security.patch, fixed upstream - add PreReq: permissions - removed unpackaged doc- also supply MS_NODEV to avoid exposing device files if someone got them on the encrypted media.- point the desktop link to the right .desktop file - build mount.ecryptfs_private with -pie/-fpie- hook pam_ecryptfs into pam session and auth bnc#755475- added security improvements to mount.ecryptfs_private and pam_ecryptfs (bnc#740110)- patch so ecryptfs-setup-swap executes boot.crypto- updated to 96 - bugfixes - testsuite added - ecryptfs-verify utility added - write-read test utility - mark /sbin/mount.eccryptfs_private as setuidable (bnc#745584 , bnc#740110)- add libtool as buildrequire to make the spec file more reliable- Updated to 92 * Fix umask issue introduced by last security update * some bugfixes- Remove redundant/obsolete tags/sections from specfile (cf. packaging guidelines) - Put make call in the right spot - Use %_smp_mflags for parallel build- Updated to 90 Fixed several security issues: * CVE-2011-1831 - Race condition when checking mountpoint during mount. * CVE-2011-1832 - Race condition when checking mountpoint during unmount. * CVE-2011-1833 - Race condition when checking source during mount. * CVE-2011-1834 - Improper mtab handling allowing corruption due to resource limits, signals, etc. * CVE-2011-1835 - Key poisoning in ecryptfs-setup-private due to insecure temp directory. * CVE-2011-1836 - ecryptfs-recover-private mounts directly in /tmp * CVE-2011-1837 - Predictable lock counter name and associated races. New ecryptfs-find binary to find by inode.- Updated to 87 * src/utils/ecryptfs-setup-private: update the Private.* selinux contexts * src/utils/ecryptfs-setup-private: - add -p to mkdir, address noise for a non-error - must insert keys during testing phase, since we remove keys on unmount now, LP: #725862 * src/utils/ecryptfs_rewrap_passphrase.c: confirm passphrases in interactive mode, LP: #667331 - Updated to 86 * src/pam_ecryptfs/pam_ecryptfs.c: - check if this file exists and ask the user for the wrapping passphrase if it does - eliminate both ecryptfs_pam_wrapping_independent_set() and ecryptfs_pam_automount_set() and replace with a reusable file_exists_dotecryptfs() function * src/utils/mount.ecryptfs_private.c: - support multiple, user configurable private directories by way of a command line "alias" argument - this "alias" references a configuration file by the name of: $HOME/.ecryptfs/alias.conf, which is in an fstab(5) format, as well as $HOME/.ecryptfs/alias.sig, in the same format as Private.sig - if no argument specified, the utility operates in legacy mode, defaulting to "Private" - rename variables, s/dev/src/ and s/mnt/dest/ - add a read_config() function - add an alias char* to replace the #defined ECRYPTFS_PRIVATE_DIR - this is half of the fix to LP: #615657 * doc/manpage/mount.ecryptfs_private.1: document these changes * src/libecryptfs/main.c, src/utils/mount.ecryptfs_private.c: - allow umount.ecryptfs_private to succeed when the key is no longer in user keyring. - Updated to 85 * src/utils/ecryptfs-recover-private: clean sigs of invalid characters * src/utils/mount.ecryptfs_private.c: - fix bug LP: #313812, clear used keys on unmount - add ecryptfs_unlink_sigs to the mount opts, so that unmounts from umount.ecryptfs behave similarly - use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek * src/utils/ecryptfs-migrate-home: - support user databases outside of /etc/passwd, LP: #627506 - Updated to 84 * src/desktop/ecryptfs-record-passphrase: fix typo, LP: #524139 * debian/rules, debian/control: - disable the gpg key module, as it's not yet functional - clean up unneeded build-deps - also, not using opencryptoki either * doc/manpage/ecryptfs.7: fix minor documentation bug, reported by email by Jon 'maddog' Hall * doc/manpage/ecryptfs-recover-private.1, doc/manpage/Makefile.am, po/POTFILES.in, src/utils/ecryptfs-recover-private, src/utils/Makefile.am: add a utility to simplify data recovery of an encrypted private directory from a Live ISO, LP: #689969- Fix build with adding requires on mozilla-nss-devel and python-devel. - Fix package list.- Updated to 83 - lots of bugfixes - improvements- Package baselibs.conf- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).sheep11 1527284156111-2.31111-2.31111ecryptfs.hlibecryptfs.solibecryptfs.pc/usr/include//usr/lib64//usr/lib64/pkgconfig/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:SLE-15:GA/standard/e91efb3311854dc7b1627e5041556517-ecryptfs-utilscpioxz5x86_64-suse-linuxC source, ASCII textpkgconfig filePRJ #dy.UOutf-861f1f08224821c7f9d094584dc671d132a99c0a29aa6b5538afcd5b8b5092ef9? 7zXZ !t/W;] crv(vX0|~h{hJnyFji\0Yץȉ^Z/qS7EBv#M>YJ**c2AĹ/Sphm[< U#Ho;]Lc(h"KvnzŴ񲻬7qk,Dъ@%^H4fU%7rzE)*>Bo iVݕ& S%*9&5뎚6k1A޸?q%6f>nB>/$Qi݇'{ypA8 ;5`E QC$=4~ eeE(m@8=QgV6OBSE<܂RKך>܂l!i?iG- z_F 9h X~;ðrn/7\8)'Jx58*-xC O~/deZ'HU䋘27%H!j+ I@k7bW'R xx߫~{]{.:'CT 72 6/yf' GwJBWŁ}E}j/h;>W;?h >\X1㪜 @_hz3 0ofu!u+se~XqS,2tmp؊=Bf[ ~Gwt". Xӝ â~j ;1"RuI{ -.~1wMԕ@$8FGB'#"L [ Cq aRf=q)8!J^'n Hp\ejJ E{2*HϠ|44IedK29&hz§B _Fvôx=x@ȵ}V!nviWbqh;髋Yf۶!G6lk2SHjTѿ$σSt.|R(0EN隨[6L]kȄ}CRk =).cs{z:`ɑi5U !l qrQҁ ˰4Nwsy b bDYw H>0 $dUw2B27"-kh ?*Zn+$JC5nׁ3HNxR4; g GNJcsef?[ ǵ|hqxGMk> L0<Ն^3W;RU4Z:, zV̭i] 3k<- m:X` dck466b-S8Kiӌ(%)c `|mↀR6S\;Pn'E=;oh@yޝ7Å]WCAcu_( <.2lT{<0osp/H}Z+o =q1Jϴz5 uOl!^VY(@ueNc6R)ν5=_h5E|͊+8P d,/@*'6HN a&EW4_UXLzKIo9 7PTUA)5IuL.XZor]BJz+ۚƺ!rnum9e4 lQZDyi7se3Rv<2͍̌Ԩxθ)ohou_pfi~iUOxyڗ!k[*=%/쪚*й aͼAj,nf8KXn'ܫ޶s AκP2PJ%X Ep#VETjv ]a1?ϴcDWBߕF6  gZn^Tx;E*zKO8:;oOM͹b]]]m an䖥G9?=.w1Yl5w%'I =4fpXmx9`k"#d `&[}ڥ5s>lRuE(7vK^iLZ=8y$&6A]Py0\1I |th,PCă{ؒ5zNR."B lUpNh^5*Mˉ^m"`ĿGRK Q !2CL l&Xo5ϘS%07̍~jp$Vuκ:;k'OK?y*^4G w}Nʜp$m]_ M)t l9kQt+q-;rpDR?װ|z; {cGV,X|!l!:bv6Z[ʪ譫VI^̆B{[ʦRS $IV!`ӵL,~(8|KjP=5tgo eư?}9 ͙zeu@s]KI½e=fma*Pzۿ, `t*h7v*Y1udmXL?OM@|՜,48cZN**st,CG #iD@Uе" 9_/i.%.VD1 $jͪ: DQBxx#Qa'BB۸, 1Igg2iBsjDTC sSs&N 7uOG((WeK4XBUҒVL;XiP'O3:-/fkoÆ7bNP+@25o\dv DY[9kو qu\=k=ԆN+V7,>ey7ܓX[aZʶۙ쫭sGv)HBwX*d0YQnvf7)Z#jh:9ؕ~r dIG4s$֒;> Q}ҋm ~0 QeP۫S B› / 4fmltwJ CiGʺC'{l]U3G^˷~4bFok /#psoڣZ"1mKL@6vF~{%IHDɡ+kSHg-č*CaW/I}Tޗf3u+:,,]X^Yǜ0<\R$+ 4a)CLy%U yNa{Ze9YpsL]3Ùu``?ꘓ11<3m8g/ۀ\?ZH aIJ0?fDNLbbgZ״94Xweр'j:: sB)e{F@@@PcTsFF+ 5 xN+@vb(Zcދb޸CNþWcXm; <8,Qq[/kTm%pu*Zm0!δ>P3+;(F^TFkk㮢  SֻfS{ys;}vI!,o՞s$`5zXNB:KOրmijbYLtJv] VRfQ:MReٕpVW ޔ-98Jae- Lؖ"ڏ\V#Q}ogko*OaYdJ, Q$iVj.vYd-r1? vI!5TBgU=g8VMC%wp!`s ;"dj+$U詊vtJ(܌9 GMm *$Q P&RhCVlӟ\D[fbO{JD]^V.{ 4l`,3JrN3d%sþG Ops- fGCzHllU>,W ;:it0@8Alug%n'b_4/PhTѶ9Ts_06q }n^+Nf>EWlU -ZzOK]+⼤ @~!et3 5/t|U N^= ^Я-N+csXUK.q~h_&\_$.zGe t-lt%+^]|Hg1zH/(r6 %y ݞd4]E?IImQB(Ȥd$4ԖgvNR1&)_lO8qO[_~L *d7?ɩxGBcg :-BNIڌ)'5"OS~aYLQfmVry5Q0*NR]hqVm-ق3$ƦV bqEwZE/̟#/tn`C ]JgtʸM:Á,F膢֋| z`hzrO[$ۧwFjr01tQ+bo;Z&85%ObCc%킾V۴&$ܵ+mmƗ~*~(Ҹ7 zj{ I 쌤=&6! >p=<W2֊ՋU%(ճ=&C\E#0CqJy"  xEV/]= YZ