pam-devel-32bit-1.3.0-lp151.8.3.1 4>$  Ap^Xٸ/=„]iP`v67++cfV~eVND@=B5/GG&g!-Ewnd,my>ڍe\XGD74$W7:u.?';HQ. P~,(4O|'iɜ=,U;^^1Kz#Cć \5~*JSA$ьTB2}6{!ٞ_"u4LGn!4 8]ͤ>wALd5446be9f2ba4b11c30f58e42c2da940e2b1d56fc33a94c29ca806ec59ca983b425d7930959f7bf30f799ec2b90208cb6620fb4bx^Xٸ/=„ 6H1ae&`+5 dlt[ii&BUpѣ гsdeDTa- Lgi: h+ ydi* EOmd#-">Zw` M>%|H+{T]XKOL{D]׋]GhT4r|Ud9E_NLS(x/Ҿ-3T7jau_eie D8]2Ӄ3k0@tXW`X>p9?d $ T 06@L R X d g ,@(89<: GHIXY\]^b&cdqevfyl{uvCpam-devel-32bit1.3.0lp151.8.3.1Include Files and Libraries for PAM-DevelopmentPAM (Pluggable Authentication Modules) is a system security tool which allows system administrators to set authentication policy without having to recompile programs which do authentication. This package contains header files and static libraries used for building both PAM-aware applications and modules for use with PAM.^Xbuild75openSUSE Leap 15.1openSUSEGPL-2.0+ or BSD-3-Clausehttp://bugs.opensuse.orgDevelopment/Libraries/C and C++http://www.linux-pam.org/linuxx86_64^X^X^X/lib/libpam.so.0.84.2/lib/libpam_misc.so.0.82.1/lib/libpamc.so.0.82.1rootrootrootrootrootrootpam-1.3.0-lp151.8.3.1.src.rpmpam-devel-32bitpam-devel-32bit(x86-32)    pam-develrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.3.03.0.4-14.6.0-14.0-15.2-14.14.1^O@[[;@ZZ@ZYY@X6@XIK@W@WW'A@W!@W@W VbVbVn@V@Uz@U>U>$TTTJosef Möllers josef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comfvogt@suse.comschwab@suse.dejosef.moellers@suse.comjosef.moellers@suse.comdevelop7@develop7.infokukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dejoschibrauchle@gmx.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.debwiedemann@suse.com- Add libdb as build-time dependency to enable pam_userdb module. Enable pam_userdb.so [jsc#sle-7258, bsc#1164562, pam.spec]- When comparing an incoming IP address with an entry in access.conf that only specified a single host (ie no netmask), the incoming IP address was used rather than the IP address from access.conf, effectively comparing the incoming address with itself. (Also fixed a small typo while I was at it) [bsc#1115640, use-correct-IP-address.patch, CVE-2018-17953]- Remove limits for nproc from /etc/security/limits.conf ie remove pam-limit-nproc.patch [bsc#1110700, pam-limit-nproc.patch]- pam_umask.8 needed to be patched as well. [bsc#1089884, pam-fix-config-order-in-manpage.patch]- Changed order of configuration files to reflect actual code. [bsc#1089884, pam-fix-config-order-in-manpage.patch]- Use %license (boo#1082318)- Prerequire group(shadow), user(root)- Allow symbolic hostnames in access.conf file. [pam-hostnames-in-access_conf.patch, boo#1019866]- Increased nproc limits for non-privileged users to 4069/16384. Removed limits for "root". [pam-limit-nproc.patch, bsc#1012494, bsc#1013706]- pam-limit-nproc.patch: increased process limit to help Chrome/Chromuim users with really lots of tabs. New limit gets closer to UserTasksMax parameter in logind.conf- Add doc directory to filelist.- Remove obsolete README.pam_tally [bsc#977973]- Update Linux-PAM to version 1.3.0 - Rediff encryption_method_nis.diff - Link pam_unix against libtirpc and external libnsl to enable IPv6 support.- Add /sbin/unix2_chkpwd (moved from pam-modules)- Remove (since accepted upstream): - 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch - 0002-Remove-enable-static-modules-option-and-support-from.patch - 0003-fix-nis-checks.patch - 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch - 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch- Add 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch - Replace IPv4 only functions- Fix typo in common-account.pamd [bnc#959439]- Add 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch - readd PAM_EXTERN for external PAM modules- Add 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch - Add 0002-Remove-enable-static-modules-option-and-support-from.patch - Add 0003-fix-nis-checks.patch- Add folder /etc/security/limits.d as mentioned in 'man pam_limits'- Update to version 1.2.1 - security update for CVE-2015-3238- Update to version 1.2.0 - obsoletes Linux-PAM-git-20150109.diff- Re-add lost patch encryption_method_nis.diff [bnc#906660]- Update to current git: - Linux-PAM-git-20150109.diff replaces Linux-PAM-git-20140127.diff - obsoletes pam_loginuid-log_write_errors.diff - obsoletes pam_xauth-sigpipe.diff - obsoletes bug-870433_pam_timestamp-fix-directory-traversal.patch- increase process limit to 1200 to help chromium users with many tabs1.3.0-lp151.8.3.11.3.0-lp151.8.3.1libpam.solibpam_misc.solibpamc.so/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:12056/openSUSE_Leap_15.1_Update/02636e5b878c38fe31b2672775471afd-pam.openSUSE_Leap_15.1_Updatecpioxz5x86_64-suse-linuxutf-806a429e2565acea6ecb5446ffb75033156ce20830c3681e81a21f39cca1e8e90?p7zXZ !t/W~] cr$x#BV&}[/Umzrwi7@An c/U ty lnv:c@RFKv]{+IJ3a?T:=E]Lu.zgrȬ mIQU/~2&AvM YZ