ca-certificates-2+git20170807.10b2785-lp150.6.3.1 4>$  Ap[|/=„rOYL6tF ζ-LH#X즳t`20B* [v{V=%wg`)$gHuHJc_ h4(_;ܦ#y6p_$sXxۈzE艌tU%Z;j Tcy@.[g} jP[*_!2u6N8$@CJVn1Hm6&갺l%eWg0234516480e6ae3cd24d329051e179fc18e5fd1a04fa68a648572136f50927db0c90d377fcd0ecf4d48cb489e69d0e8adcd089e9k([|/=„v oBձ[C!p4.}!xI7<,j7m;@&"nx/s TgXs`_ʗc~s4蒕uW{8w/ʿ.y\7ǵ9dg~dQ -롤J/Ou[?%aK.Q1`E]-+lWdH@(P Y lU Ih$f6_Ai%Q0aգs !Bgӟu#DFhf;Ia۫2>pL;d?;Td( 4 j $,0CL] v Z  l      l    x   8t \ :( h8 p+9!+:#+=1>1?1@1B1F1G2 H2 I3 X3$Y3,Z3p[3x\3| ]3 ^5b7c7d8]e8bf8el8gu8| v8w9 x:@ y:z:::;;;;;PCca-certificates2+git20170807.10b2785lp150.6.3.1Utilities for system wide CA certificate installationUpdate-ca-certificates is intended to keep the certificate stores of SSL libraries like OpenSSL or GnuTLS in sync with the system's CA certificate store that is managed by p11-kit.[|lamb21p'openSUSE Leap 15.0openSUSEGPL-2.0-or-laterhttp://bugs.opensuse.orgProductivity/Networking/Securityhttps://github.com/openSUSE/ca-certificateslinuxnoarch# migrate /etc/ssl/certs to a symlink if [ "$1" -ne 0 -a -d /etc/ssl/certs -a ! -L /etc/ssl/certs ]; then # copy custom pem files to new location (bnc#875647) mkdir -p /etc/pki/trust/anchors for cert in /etc/ssl/certs/*.pem; do test -f "$cert" -a ! -L "$cert" || continue read firstline < "$cert" # skip package provided certificates (bnc#875647) if test "${firstline#\# generated by }" != "${firstline}" || rpm -qf "$cert" > /dev/null; then continue fi # create a p11-kit header that set the label of # the certificate to the file name. That ensures # that the certificate gets the same name in # /etc/ssl/certs as before bn="${cert##*/}" ( cat <<-EOF # created by update-ca-certificates from # $cert [p11-kit-object-v1] class: certificate label: "${bn%.pem}" trusted: true EOF cat $cert ) > "/etc/pki/trust/$bn" done mv -T --backup=numbered /etc/ssl/certs /etc/ssl/certs.rpmsave && ln -s /var/lib/ca-certificates/pem /etc/ssl/certs fi test -n "$FIRST_ARG" || FIRST_ARG="$1" # disable migration if initial install under systemd [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$FIRST_ARG" -eq 1 ]; then for service in ca-certificates.path ca-certificates.service ; do sysv_service="${service%.*}" touch "/var/lib/systemd/migrated/$sysv_service" || : done else for service in ca-certificates.path ca-certificates.service ; do # The tag file might have been left by a preceding # update (see 1059627) rm -f "/run/rpm-ca-certificates-update-$service-new-in-upgrade" if [ ! -e "/usr/lib/systemd/system/$service" ]; then touch "/run/rpm-ca-certificates-update-$service-new-in-upgrade" fi done for service in ca-certificates.path ca-certificates.service ; do sysv_service="${service%.*}" if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --save $sysv_service || : done fiif [ -s /etc/ca-certificates.conf ]; then while read line; do [ ${line#\!} != "$line" ] || continue cert="${line#\!*/}" ln -s /usr/share/ca-certificates/anchors/"$cert" /etc/pki/trust/blacklist done < /etc/ca-certificates.conf echo "/etc/ca-certificates.conf converted and saved as /etc/ca-certificates.conf.rpmsave" mv /etc/ca-certificates.conf /etc/ca-certificates.conf.rpmsave fi # force rebuilding all certificate stores. # This also makes sure we update the hash links in /etc/ssl/certs # as openssl changed the hash format between 0.9.8 and 1.0 update-ca-certificates -f || true test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" -a -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -eq 1 ]; then if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl preset ca-certificates.path ca-certificates.service || : fi elif [ "$FIRST_ARG" -gt 1 ]; then for service in ca-certificates.path ca-certificates.service ; do if [ ! -e "/run/rpm-ca-certificates-update-$service-new-in-upgrade" ]; then continue fi rm -f "/run/rpm-ca-certificates-update-$service-new-in-upgrade" if [ ! -x /usr/bin/systemctl ]; then continue fi /usr/bin/systemctl preset "$service" || : done for service in ca-certificates.path ca-certificates.service ; do sysv_service=${service%.*} if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --apply $sysv_service || : touch /var/lib/systemd/migrated/$sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable ca-certificates.path ca-certificates.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop ca-certificates.path ca-certificates.service ) || : fiif [ "$1" -eq 0 ]; then rm -rf /var/lib/ca-certificates/pem /var/lib/ca-certificates/openssl fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart ca-certificates.path ca-certificates.service ) || : fi else # package uninstall for service in ca-certificates.path ca-certificates.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi fi&: o FWAAAAAAAA큤A큤A큤AAAAA큤AmAm[|[|[|[|[|[|[|[|[|[|[|[|[|[|[|[|[|[|[|Yq[|Yq[|[|[|[|[|[|[|[|[|[|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-certificates/ca-bundle.pem/var/lib/ca-certificates/pemservice@@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootca-certificates-2+git20170807.10b2785-lp150.6.3.1.src.rpmca-certificatesjava-ca-certificates@ @     /bin/bash/bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/perlcoreutilsopensslopenssl(cli)p11-kitp11-kit-toolsp11-kit-toolsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.23.13.0.4-14.6.0-14.0-15.2-14.14.1[:@ZZ2gZ*~Z@YV@YGVC-U@UQT^S@SuS@SǺSS @SkqSB@S>R@R^RRQQ)@Q4Q4QONS@M6@L@KuKKKK@K@K@KKKJason Sikes kukuk@suse.dekukuk@suse.dekukuk@suse.comkukuk@suse.delnussel@suse.dekukuk@suse.delnussel@suse.delnussel@suse.delnussel@suse.deLed lnussel@suse.delnussel@suse.delnussel@suse.demeissner@suse.comlnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.dehrvoje.senjan@gmail.comlnussel@suse.delnussel@suse.delnussel@suse.decoolo@suse.comlnussel@suse.delnussel@suse.demvyskocil@suse.czlnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.de- Changed "openssl" requirement to "openssl(cli)" * (bsc#1101470)- Use %license instead of %doc [bsc#1082318]- Revert last change since we fixed systemd-preset-branding and this requires is no longer needed.- Re-add systemd requires, else package will be installed to early and services never enabled [bsc#1071776].- Don't require systemd, since we could be used in environments like container images, where we don't have systemd. If systemd is installed the systemd units will be used, else they are not needed.- Update to version 2+git20170807.10b2785: * Check TRANSACTIONAL_UPDATE is set (boo#1045942) * Add systemd units- Run update-ca-certificate by systemd unit when the content of one of the paths changes. Needed for read-only root and/or transactional updates.- Update to version 2+git20151110.c15593c: + set proper umask (boo#948724)- require p11-kit-tools >= 0.23.1- Update to version 2+git20150324.e3ee392: + p11-kit 0.23.1 supports pem-directory-hash now - use service file to generate tarball- fix bashism in postun script- use rpm -qf to determine if a ssl cert is owned by some other package and therefore doesn't need to be migrated (related to bnc#890205).- add p11 kit header to set label of migrated certificates to the file name of the previous one (bnc#890205)- removed the version in the Obsoletes. The package in SLE11 got version updated (bnc#887099).- clarify the start order of the generators, as certbundle.run semi-depends on etc_ssl.run via a timestamp. (bnc#883386)- fix directory permissions for real this time (bnc#871639)- don't keep certificates with marker (bnc#875647)- copy custom pem files in /etc/ssl/certs to /etc/pki/anchors on update (bnc#875647)- Fix typo in man page- package correct permissions of generated directories (bnc#871639)- etc_ssl.run: fix typo - turn /etc/ssl/certs into a symlink to /var/lib/ca-certificates/pem- fix typo in README (bnc#845500) - remove old extractcerts.pl- re-enable the CA bundle again for glib-networking (bnc#825903)- make sure we have p11-kit >= 0.19.3 which has the 'trust' command (bnc#836560)- don't remove symlinks to other locations in /etc/ssl/certs - use the trust binary instead of p11-kit to extract trust- disable generating ca-bundle for now again so people don't submit new packages that use this file.- Explicitly require p11-kit, otherwise trusted certificates won't be generated- update manpage- use p11-kit to generate the files- give hint about SSL_CTX_set_default_verify_paths in cert bundle- require coreutils for %post script- fix spurious rpm warning if no java exists (bnc#634793) - move java.run to java-ca-certificates- catch FileNotFoundException (bnc#623365)* Use the gcc-java and fastjar for build to avoid dependency problems * build keystore.class only to allow noarch package- create java bundles- also use hooks from /usr/lib/ca-certificates/update.d - replace bundle file with symlink to file in /var as it's auto generated- force rebuilding all certificate stores in %post This also makes sure we update the hash links in /etc/ssl/certs as openssl changed the hash format between 0.9.8 and 1.0- actually install certbundle.run (bnc#594501)- it's ca-bundle.pem rather than cert.pem- obsolete openssl-certs (bnc#594434) - update manpage (bnc#594501)- include /etc/ca-certificates.conf as %ghost- generate ca-bundle with hook script - don't use trusted certificates in ca-bundle file for compatibility with gnutls- new package/bin/sh/bin/sh/bin/sh/bin/shjava-ca-certificatesopenssl-certslamb21 1538751667  2+git20170807.10b2785-lp150.6.3.12+git20170807.10b2785-lp150.6.3.11 ca-certificatesupdate.dpkitrustanchorsblacklistca-bundle.pemcertsca-certificatesupdate.d50java.run70openssl.run80etc_ssl.run99certbundle.runca-certificates.pathca-certificates.servicercca-certificatesupdate-ca-certificatesca-certificatesREADMEca-certificatesCOPYINGupdate-ca-certificates.8.gzpkitrustanchorsblacklistca-certificatesca-bundle.pemjava-cacertsopensslpem/etc//etc/ca-certificates//etc/pki//etc/pki/trust//etc/ssl//usr/lib//usr/lib/ca-certificates//usr/lib/ca-certificates/update.d//usr/lib/systemd/system//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/ca-certificates//usr/share/licenses//usr/share/licenses/ca-certificates//usr/share/man/man8//usr/share//usr/share/pki//usr/share/pki/trust//var/lib//var/lib/ca-certificates/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:8871/openSUSE_Leap_15.0_Update/b6b3af5b3aaf65542d9045fe1660dfa8-ca-certificates.openSUSE_Leap_15.0_Updatecpioxz5noarch-suse-linuxdirectoryBourne-Again shell script, ASCII text executablePerl script text executableASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)emptyRRRRRL$I:pcca-certificates-mozillautf-889065e12b32ad6bfc8706ad34ebe13c3354b6c52a2dd54c4dc0d5cfa71940a70?@7zXZ !t/*] crt:bLL t&+ Su_7 L1P0\:(haVQqg?;C R,gqG)Eyb6NX&qͳӵ[ ex(9?zˋ%ݻc-ݩXJmXJQѮfƬYmctlF2b盛w!ز8i=Vk ZH ʦZ{f-5Fm-l>[`:ڢ;R׌= ,+~iH 6VqXDE* ԅ:<`%趄;N {9[h[L,&~,in~eK}Co Q]Ќe.MvFk-Bб;Vsk,y#4jJ{:[ͨrA1=]%{KBP Q,:`W+ :/D}]s\H},.u߈*}\ZR/Gi4w zJ@vAX+~|R }(hxKEN+Iw\On f?Ywm'!zz+r^W}@e;m+}$A!RjYz=xk&u{X {KqZB  FUM& |^\db9 8UOUa55i'*wsW`RtCO51Jd>A6x~?WV YFe%|`w$*s#SWAHrtwlߍK$T?KiYgEvdQpc')rviq%P`9c{Uh@orPL7J?sФͫX;O{XoV;̃]Y_< G%.K!'l SpV`zypvHW @u5SFR1 {jp#@~IL]4O&\ su, {G\f^3YFA+E*~5JI%G/4SôRp agȶ_ּLbn/./* 16o^DEpg}3fșj' U|0.:,;@ 1?ê<߰:$HhY0;wWo{ɠ_D!  W'AΗ|| D *LhL-Nb1z C;y k恸u^Qx>ç,:]Pk%V-2IvV%g#%ƍn0 12EI[*k_5>˞cAmȕp !8yB*KK89DmiNmNf|'J&5E6>i1 +,5l9H6Y>(*!s׵q`ll ?X /j'= Aw(FWuyH08`J7k!$|X;+ ߲5WP5 zy cv; %"_skZUouU~ծfLGW̔ H2ŵJ.O#جjZ6,|v7p;:w0в0`s,a' 6wY H X&U ?tZMQ$-T&<".3\|-p|o+XHp,YҗdHj嬆t%Vz)`V^D#m7+;ZJ>B-ZXP[dSb(QB,KYђ|qC|G&<@6B'=\bPP]w;aJ^)K'Uq?( ɼk츶JnRц/Jխ3Pj*3_o -=OסT' %Z&fq[ Qf3N}5aodd L.l&J'?B«@czÖYN:ܭJn?ܚ{uⰴԨ3?udEbbqIŸ"~w l-Tx gh0N<:ǠX~DvÏFYp?]-KQ˼T/SWzRܕoCKnYQ= -D6ЅWO;fxT0<ͭMA ?)Z@wLraҔpd 5uy=Dٻjf}-ėL-7*0%.K6T=X/%> ë5۫7H48v-S|\8VQU)n ܺժ¼;1'KIkҶaCAoiX_ڢ>Oi9i 6J.U@+*-!巡Fs@6u?f>իk:*whss4~="m}^_Rj SF1ސ^a8Y}$7,:9r\\:y3Ҷ꭭܀?oIg *pҔt5mLY3u K 7T?+"1ki {R^d=\E0Z,s[0Bok 3dqGы"!!E AT-I"5zԵ*Eɻ#rHd䡱f8 pnyqPِ~x&@P+2ؤ0L43k\#CH{[f:0*,ib`tLRPbIQ+jaPPEz_.idhjOc1L1t@f` ˘fR@?ܤt 9Eycr.%jvea٤c)OL_?&6dYnnT6R$Ur_W\zdl7$K2Y]pk<=SQg>@RfSp0 )2{5"lX'ҽ6=,M1B1HLL4R!7%i,sycCɨ|o4$U9;!T5FwI֤Zds3 ;60T'+H|K"D `&Sl [&й>A!6s^䡀D-D$)(l9\&PU@v.8*nVRSΖvXt0J5jB[b鞹 ^ 9' ~h䊈Ԣ؏י' M&X58yVҞ,D C綩ǯx}9( h!-Zp(FhʇȆهVz0n:ݺoqj^R*rNeI9M7h< Iꗌ#~$0(r9YxB:&g76+2N`=ZСdcD !\S6yHwQhKd:9 Zp`%ᬕMeKlK68D7º=P3Į0Jpsh8/a,'v' &^53|dA.134C5h\Jv7yV*f"p2/4e70zФVA<Nݡ[{{(Pi*4G< ^?K[4C|q2mYfIñ*,4&N`0⺣{AyU–o;H 8#87𚬌&WE`M'Y1koGt"&ֱh^ӿM^WGD=`[C(a-n@pf:W o-[ +KB.7j+!ު rI!$fOpJ}Dۀ^tp꘴&I;'1Z%r ?Qs6%]ӕN_ga_IZdV1aتG>.gt^mLx`gv9\W0q 'qA}MVzvfTdbïgp@U)B|~E}Ԍ~ȕWyĻ0pL5/s'#LR]j:}1 ߹u4ǃzpc8ٗ)hX>pQqLHuFMbu&k-m̉$A@ȝ0[Rw'Iz=bj'!UV/v/yŘ_C')ԡlBʦ`6H H/bh,|;\!z{RaN>,rT7!ǟ _YC O:cœTԫsD>YVs!3?$Z %Lpk^սB*^MW̓(s^ oB}E\S(^0UA=D#Z*w1'PUlB1^vUPBQ7YMX9t,,:$~5lRK6Ç4sLroldm7lUm]!@5IJt[n-Vڊf|XKnj3na%X;_*%AŒax~:ҍΏX c 7^LEC ( %=;g 9?Ǡ5N v>Jx-2HM!Fi>KR5mĔJhkS7݁L@5QxzqWki!.d_K2Zq,,D&nne0";Aџ'\[4Qfk@Ns uٖ BkЏNrP\8_F]`#7 ]kԅAS>cq Pz l6~SF{N)#JDpCwڕMu j/j+NM^7K8'Ɍ+Way# hFK:^/OI0@/&m;#dbQ24 (GA_ƒżOW{JecfKlj lffR$I h]qPwY&Hee\u (*Z?jl8`1+8_kjʂ&lRn͎lّQ|] Y,EVi ^ܔ&% }ۧh F e\/&ㅘUh(z ;1pf~/R;Wu8kVr(=q );:,['sƇ05!-r(hvEKHNӵ>*gOK~`gƔ;KՖt}*^WM^A\!iХ^\=kMp^'\ajnM~|lfW#b/6}k&߼m$ȇ7tX\ϯm)HL,l#Bs-WG8Lzɘ-FJ:'K7 ƘU;h~O-eY [<+1qmLЭs \?mD6*"$xE^]iY$a-XɒN\Ԁ)gsei_zF{kNĽq>ȉáU|̤|^[2Z6fQjdr>W[3,`Rc-ׇ a.k|0H#C.F]X]ETg/(;d0K!&ҲfWV86<'U{T9W 'H@ł%/ț8d2 /+ey W%$BHjJR kfjsiwn:{@1iR 6շpi۲%E_+`WzPΆH^xX%zzv,dݩ&m+T#XWlGH@[`F$ 8n薬bZ8٦nksj]ԕ#rn-!Y-|]n*雐=ei՚8iZYcrYO.g)Oz5jqTU?-k`~qlHDh]ܑ / H:(FՑ(-g.<,.,yakZgul1.NÛvu ɕ\[mpG?SQOlU)Oi%S~1x CNh{~z۝fa(sd5(ٍ=b~gCW2$ɯCZVSA_> TD"SJeި7CEr- a”mHc>.2 Ԯ>(m1Šp0h=CT]žKk._Ba-u4|"͖%2u:M)6Wtzm ]]$^,&)fN`!ρRb&{\Fw10E!Bh Τd?ӱa wʿ5@ kr%J[\0r Xm~Jc du|ԓ0l<"MZeEM/C"U{>q@ IaJlW4["pp@ oM;}Fcm%]k+#F]~+jVM A-Jz˵>oǏJ2_;3ΐ\J;'ޒICuMغPK K fsMe{G;.iᴰϔ3_-dbOUFƉ yA ո;>@SoD <a[6Xog؏]ZsDc^Q!y-!vA0=R  6cO!q+,$yI9MrLŸYԞ<_#MpwPg@svBd0_6x-bg!TFqQjY.?Jvd14K ӓ`vSUQ3KXo%NPPA=ئxarHefr\kcp15 % 7ޣAH0a:a!ר0r@"/TiϤuo[\h/@wo {%m?*Z#n`=C.FcaX1*k9 Cms{E4V|/S\azupCc$hTw gv.P]{ $L7i߫+@DnC1K?Ji >7^hHcͰP>j'a5J@SXOeh^;ҭV)@I[ċ#fL!~L3OvT[Q![[mE@[C%"ņJPBv5w%d @[31_ү2g=n!(|v8AC[Z,&CB)z8.';ERSTn6=2 < a Rdv\Ԭ /]80~+Y3tf jܽ1p%mGv6 ,[Wo/ģnt(y-pk{Yn2ֿ +6`jNOh<77qM{~<j@ :Om⼧Zl b13fesGC~K{LX& GbUn#[ȝJrl𷣞-8];bg vUF%C`to> S$qYU<[Ggf򒂫_*=m.JrSjS:WښCLwiKʬ0xs!Z=YF_ZLPAo| }ÒSE+`ia .`z*b:M O'J\x\%<(/bWBOS綏ORCrE(vځqpC]&J@]ԚpA2[`,f |*`[*uړpGbl 1:ȪuBsPUd"Զ YZ