pam_passwdqc-1.3.0-6.3>t  DH`pYP$/=„zz/|;E^h}i'{ I3n3)/`G%81 gX[dx€&\J#x5giVw0PX.HIȅQsbsDyQvr'*1L pm(B/Az[EM>\#pޏ5Iq(!|iRUv eخ1AK>}4뮆͞ӡ@W/N)i5xiΖC1nW5cdda4341795d1347a5fbdae84caa7b36f5cc1a45ʼnYP$/=„*/v~˷&,5 cHK 82aCFRTYҼ:)7VSnY7W`ؑM'| JEuA㯰]@KI㸊Qc ȭ5tTR3>43x˝52f`Ya2Z۷ XbCwU%djjͧ@8 \4VZmq%'IPr|B~VQ(Ű/Wq$AvqhA>=?d  B .?agpx |    x   (8 9@ : FGHI XY \8]@^bbcdteyf~luvwxy zCpam_passwdqc1.3.06.3Simple Password Strength Checking ModulePAM (Pluggable Authentication Modules) is a system security tool that allows system administrators to set authentication policies without having to recompile programs that do authentication. pam_passwdqc is a simple password strength checking module forPAM-aware password changing programs. In addition to checking regular passwords, it offers support for passphrases and can provide randomly generated ones.YPbuild75?openSUSE Leap 42.3openSUSEBSD-3-Clausehttp://bugs.opensuse.orgSystem/Librarieshttp://www.openwall.com/passwdqc/linuxx86_648큤YPYPcf4e9b2d4a591630bdd970e3c2a210cfd4086021a5f07c554785192314b99abdrootrootrootrootpam_passwdqc-1.3.0-6.3.src.rpmpam-modules:/lib64/security/pam_passwdqc.sopam_passwdqcpam_passwdqc(x86-64)pam_passwdqc.so()(64bit)@@@@@@@@@   libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrypt.so.1()(64bit)libcrypt.so.1(GLIBC_2.2.5)(64bit)libpam.so.0()(64bit)libpam.so.0(LIBPAM_1.0)(64bit)libpasswdqc.so.0()(64bit)pamrpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)3.0.4-14.0-14.4.6-14.11.2T9OC@KsKKf@JB@G@GDp.drouand@gmail.commc@suse.dero@suse.demc@suse.dejengelh@medozas.desbrabec@suse.czro@suse.demc@suse.demc@suse.de- Update to version 1.3.0 * Detection of common character sequences has been improved. This has reduced the number of passing passwords for RockYou top 100k from 35 to 18, and for RockYou top 1M from 2333 to 2273 (all of these are with passwdqc's default policy). I also tested on lists of cracked and not cracked passwords and reviewed the results manually to ensure there's no significant increase in false positives. * Generation of random passphrases with non-default settings has been improved: case toggling has been made optional, possible use of trailing single characters has been added, words are now separated with dashes when different separator characters are not in use, and the range of possible bit sizes of generated passphrases has been expanded (now it is 24 to 85 bits for the programs, and 24 to 136 bits for the API). The code has been made more robust: possible NULL pointer returns from crypt(3) are handled correctly, all pre-initialized arrays and structs are declared as "const", greater use of cpp macros for integer constants and some source code comments were added (mostly in passwdqc_random.c). * Darwin (Mac OS X) support has been added to the Makefile * pwqcheck.php, a PHP wrapper function around the pwqcheck program, has been added. - Use download Url as source - Remove redundant %clean section- update to version 1.2.2 - When matching against the reversed new password, always pass the original non-reversed new password (possibly with a substring removed) into is_simple(), but remove or check the correct substring in is_based() considering that the matching is possibly being done against the reversed password. - New command-line options for pwqcheck: -1 and -2 for reading just 1 and just 2 lines from stdin, respectively (instead of reading 3 lines, which is the default), --multi for checking multiple passphrases at once (until EOF). - With randomly-generated passphrases, encode more entropy per separator character (by increasing the number of different separators from 8 to 16) and per word (by altering the case of the first letter of each word), which increases the default generated passphrase size from 42 to 47 bits. - Substring matching has been enhanced to partially discount rather than fully remove weak substrings, support leetspeak, and detect some common sequences of characters (sequential digits, letters in alphabetical order, adjacent keys on a QWERTY keyboard). - Detect and allow passphrases with non-ASCII characters in the words. - A number of optimizations have been made resulting in significant speedup of passwdqc_check() on real-world passwords.- fix baselibs.conf (package is called libpasswdqc0)- update to version 1.1.4 * new library for password checking * tools for password checking and password generation- package baselibs.conf- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).- added baselibs.conf file to build xxbit packages for multilib support- update to version 1.0.5 - Replaced the separator characters with some of those defined by RFC 3986 as being safe within "userinfo" part of URLs without encoding. - Reduced the default value for the N2 parameter to min=... (the minimum length for passphrases) from 12 to 11. - Corrected the potentially misleading description of N2 (Debian bug #310595). - Applied minor grammar and style corrections to the documentation, a pam_passwdqc message, and source code comments. - Changed Makefile to pass list of libraries to linker after regular object files, to fix build with -Wl,--as-needed. - Fixed potential memory leak in conversation wrapper. - Restricted list of global symbols exported by the PAM module to standard set of six pam_sm_* functions.- version 1.0.2 branched from pam-modulesbuild75 14943723811.3.0-6.31.3.0-6.3pam_passwdqc.sopam_passwdqc.8.gz/lib64/security//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Leap:42.3/standard/5fc68b464b07fd8ad29e618e3e32c35f-pam_passwdqccpiolzma5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=3368346a5e84a71bf43960703a0c4b255d694843, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) PRRRRRRRRR=ERR;|#ȏVFpasswdqc?0] crv9uhcelſn]"㴁HlS6'ڣR+OE tSM)@88䧽"[&OuTM,9daHF7qk"<֋&^ŦmB_斶}dfͪU@/C5Mz*k/,  7jT$"v*` 's =AҋpMP2Cp#P0) ȭ"Ȼ?6:7n^z_S`/p.B&c;_&i(h\}qYKP֥7 $}`Ûݐs0`y(d{[g\&&zMF$c@GͷҿGdj݋HI9ZXW<_.аPzU&8046ew'c(Ӡum3Bn#p{%}p!KvE>DK N)tVq@s3^'ҭRz-AՠT^0N3D.xju:BOڥpn6EUUP<}lGQbj޺NQQOu4|?z( v <1L"CgsAl`ݓqjAor;ßkt{4~evR*f(.( 9,!_8aFt?$,# ;A)[@B̵l-RWDC|w?h˕O4|6umh`?X-%sBހْH !+8ugm&AF(?fZMvbef;jH$SsO+BTL#zh(!EU`ѵү)D.n<E j;d%Q]xZY)3 &?/|-)ye{Zx #N2dS~<|Gk_w,UgרтERIqPðl΂;ǚ4ə]a]NrbZkz ap&ƶN5gb6(ZmCzIa {Vp" :f 01E9YCQy{dzX3Gcc5  [HOn̟c8^~!E٫Sn0545*5Ik4tH\Cvtw\Z甄[6a.& n#c(ΡhS_ Y?פW m1! dy2>y tms8ֆ1 h5)sEs?OMmuB_G/Z $ . ,ɐϰ\Qw -nu^9hAj<FkAGќ fR mzwwG)ӣ [R]kơbLrSv ?RD4C!ma*SSŶq\i6UIHY6JO1{JM YnZ҈dS˿ _sP&""w)/jSf^ ;>lp4q?&,Jjrd FZ]i3lS/ [InL7ՔLPkXbd~9 RaWb*?(V1}S? 'ÆQ_N .,<{R)q*=Kaù?:@DJ< %gBp :ǀTlTZt$))L,쩛&ID*\*R qklS=Po;j D"m֏fŁ?8z{Q5\^a&j6  ;ʼn 'G"/VlE?*}hM.^zXש',_0p\7%1e H;hEjڢA<_[y3^U$da2T2a |{@ &Q |H%:Z>{jdqfk C( V#Eb.+zޚ&~0Bd̟ckyDNj_C<,Bc(YB p@RBO!Tpk4 u"@YYr!4 yo65i[g|e1ؾA-|e49F]Eנ"ZG/jkki*xT#ȟ=G}T\NG#w*`gS},E>rkO s ,N6!)*1908UƝ 5gzks(q X.K\+>29[ōz20Ȑʠd\_)SG#/i(Fc<@[ $Q{UseO0. 6iMEu-[x$deL KNvΕ&i1xEhqf-l}G4~pK=)R{`cjOXjOT霍IhxP>Fv3t:>u}A`f}Zsp=4-G$Ƥ`w ʼ7R36hJB'%(x,3N @nK#z˺BNOi}hi}/md9d ){;Y3ޛ9]}P8n(nhޱvf,Ut8=·ٔ46lP>q:.?@M'u*|P%Gm`n {FMhu$;V.y=Cř-zb~L,HGmT0jXS' gLh;UBsU͇"ИQG륏t7[$rzZRF=yѦiL|!M D)ԆwaBE3!:Хh& ݶMvgB(+K4] JНb َ#SPʥfFQI^D&lM~7O`vJZ"ktƒYǜRg"E"8 dl-TC]ƥ j)W31N0s8ۿ@ rY<^3lm67Ɗc"X&  ~ZʢMnʗS족-g@މBm|k ppX,؉lkDk>{-@{=у1ipA6ff,KZ.kt~_YreAB>,Չ٭*{r,Ihc1\:%~.wYQlI0cO:OЅ +epT,>nXlz]l؉U d׀@5H`ڥ1)k˜kTqS 95vpfC5z+n{GV3֥É"<7N/`‘+wIs?cOĤl߿H]#+ 9וbӤ-%uĦN ӟFS&CXrÊ2ǩ&9 _X2JE4gٟ8k7՜h}&Z#; NLb:h8_:-gY{j2j!TS*}B:}*˩83tdJBjY92q/( ?Sfxg#\o0Qރ|RHM{<;1ukߥb0&s#sN1B1n