openldap2-ppolicy-check-password-1.2-9.61.1 >  A b/p9|w_}pz/03UYr\'޺חYmq*6I/u$xPϋG#9RKǎ Fv;N~ LPegsd޸P{ג] 5qg0ѹXrna5ZN={îPUds\t:A8|CSU8[{+.Q4 A$RZ lYl89oz޾\UUc4_ ͌7Eʦ\|f6717b490b59e5bc7ded712826cc8e286ab7b5008569bb6ccd25b4cbcbc18d161e8e803329c6edafcba108747f0a1bb7476b246bb/p9|Q5|Y')G?$ oOO0M1j7Buu8B&PUM)J??@V ,9Q EF FK1Lrѫ9f6G80G ҵuU V1&>T_6Ty#Vw)Si(+S0x4BbDj?e ~LW;&VDH@8³϶QkK=2Cʜ_>pAZX?ZHd#' . YLPX\u  @  R  d      X |      (;8D99(9: L9FTGT HT IU XUYU$\UH ]Ul ^V?bVcWwdWeWfWlWuX vX4wY` xY yYzYYYYYYZZDCopenldap2-ppolicy-check-password1.29.61.1Password quality check module for OpenLDAPAn implementation of password quality check module, based on the original work done by LDAP Toolbox Project (https://ltd-project.org), that works together with OpenLDAP password policy overlay (ppolicy), to enforce password strength policies.bsheep14YgSUSE Linux Enterprise 15SUSE LLC OLDAP-2.8https://www.suse.com/Productivity/Networking/LDAP/Servershttps://github.com/onyxpoint/ppolicy-check-passwordlinuxx86_64h)A큤bbbbbbbbbd5e34422ce6775c3dd96aac6be1968e8bdd1330f7302ff54bd17139162ac3be6fe22b71e8e34817728e72ba9e2f373fcfa33941e93a5c579d59b16962942e03db73e2db0a0a0411c49995cc8fac7026c6be1c711e9fef3d28477e7f0fa4fecf3c9ffd34605a66ce03841cefa99b1b106dc299a9a940926dae288bb7a2a1e5d1a68dc4c24abfce90caa426342974610356390f242584529804a15463cb9839fc2c10049d5f5631d4a2e996e4f0bc19ca9746b2ba5fa428ac4e6cbc2a260b53f7appolicy-check-password.so.0.0.0ppolicy-check-password.so.0.0.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootopenldap2-2.4.46-9.61.1.src.rpmconfig(openldap2-ppolicy-check-password)libtool(/usr/lib64/openldap/ppolicy-check-password.la)openldap2-ppolicy-check-passwordopenldap2-ppolicy-check-password(x86-64)@@@@@    config(openldap2-ppolicy-check-password)libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libcrack.so.2()(64bit)liblber-2.4.so.2()(64bit)openldap2rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.2-9.61.12.4.463.0.4-14.6.0-14.0-15.2-14.14.1b[@``KW`/@`+_@_@_/@_FN_?@^^^*@]B@\ڭ\r@[H[@[vZ@Za@Z@ZZ.s@Z@Y*@Y*@Y@Y@YYp@Yf@Y7Y6@X@X7@X$a@XWk@WbW;VVɦVŲ@VŲ@V@V@V@V@Vf@V^@V\:@V@V @U4@T@Tuwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comwilliam.brown@suse.comvarkoly@suse.comvarkoly@suse.comckowalczyk@suse.comckowalczyk@suse.comzsolt.kalmar@suse.comzsolt.kalmar@suse.commichael@stroeder.comfvogt@suse.commichael@stroeder.comrbrown@suse.comjengelh@inai.demrueckert@suse.demichael@stroeder.commichael@stroeder.commichael@stroeder.commichael@stroeder.commichael@stroeder.comhguo@suse.comhguo@suse.comjengelh@inai.dekukuk@suse.comhguo@suse.comhguo@suse.comjengelh@inai.dehguo@suse.comhguo@suse.comhguo@suse.comjengelh@inai.dehguo@suse.comlmuelle@suse.comhguo@suse.commpluskal@suse.commichael@stroeder.comhguo@suse.commichael@stroeder.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comrguenther@suse.comjengelh@inai.de- jsc#PM-3288 - restore CLDAP functionality in CLI tools- bsc#1187210 - Resolve bug in the idle / connection TTL timeout implementation in OpenLDAP. * 0231-ITS-9468-Added-test-case-for-proxy-re-binding-anonym.patch * 0232-ITS-9468-back-ldap-Return-disconect-if-rebind-cannot.patch * 0233-ITS-9468-removed-accidental-unicode-characters.patch * 0234-ITS-9468-documented-that-re-connecting-does-not-happ.patch * 0235-ITS-9468-summarize-discussion-about-rebind-as-user.patch * 0236-ITS-9468-fixed-typos.patch * 0237-ITS-9468-always-init-lc_time-and-lc_create_time.patch * 0238-ITS-9468-do-not-arm-expire-timer-for-connections-tha.patch- bsc#1182791 - improve proxy connection timout options to correctly prune connections. * 0225-ITS-8625-Separate-Avlnode-and-TAvlnode-types.patch * 0226-ITS-9197-back-ldap-added-task-that-prunes-expired-co.patch * 0227-ITS-9197-Increase-timeouts-in-test-case-due-to-spora.patch * 0228-ITS-9197-fix-typo-in-prev-commit.patch * 0229-ITS-9197-Fix-test-script.patch * 0230-ITS-9197-fix-info-msg-for-slapd-check.patch- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service. * 0220-ITS-9423-ldap_X509dn2bv-check-for-invalid-BER-after-.patch - bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN parsing in ad_keystring, resulting in denial of service. * 0222-ITS-9425-add-more-checks-to-ldap_X509dn2bv.patch - bsc#1182412 CVE-2020-36228 - integer underflow leading to crash in the Certificate List Exact Assertion processing, resulting in denial of service. * 0223-ITS-9427-fix-issuerAndThisUpdateCheck.patch - bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service. * 0224-ITS-9428-fix-cancel-exop.patch - bsc#1182416 CVE-2020-36225 - double free and slapd crash in the saslAuthzTo processing, resulting in denial of service. * 0218-ITS-9412-fix-AVA_Sort-on-invalid-RDN.patch - bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service. * 0217-ITS-9409-saslauthz-use-slap_sl_free-in-prev-commit.patch * 0216-ITS-9409-saslauthz-use-ch_free-on-normalized-DN.patch - bsc#1182415 CVE-2020-36226 - memch->bv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service. * 0219-ITS-9413-fix-slap_parse_user.patch - bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service. * 0213-ITS-9406-9407-remove-saslauthz-asserts.patch * 0214-ITS-9406-fix-debug-msg.patch - bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck). * 0212-ITS-9404-fix-serialNumberAndIssuerCheck.patch * 0221-ITS-9424-fix-serialNumberAndIssuerSerialCheck.patch - bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read). * 0215-ITS-9408-fix-vrfilter-double-free.patch- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime. * patch: 0211-ITS-9454-fix-issuerAndThisUpdateCheck.patch- bsc#1178909 CVE-2020-25709 CVE-2020-25710 - Resolves two issues where openldap would crash due to malformed inputs. * patch: 0209-ITS-9383-remove-assert-in-certificateListValidate.patch * patch: 0210-ITS-9384-remove-assert-in-obsolete-csnNormalize23.patch- bsc#1179503 - fix proxy retry binds to a remote server * patch: 0208-ITS-9400-back-ldap-fix-retry-binds.patch- bsc#1178387 (CVE-2020-25692) - unauthenticated remote denial of service due to incorrect validation of modrdn equality rules. * patch: 0207-ITS-9370-check-for-equality-rule-on-old_rdn.patch- bsc#1175568 CVE-2020-8027 openldap_update_modules_path.sh has a number of issues in it's design that lead to security issues. This file has been removed, from the package, and the %post execution of the install. The function is replaced by /usr/sbin/slapd-ldif-update-crc and /usr/lib/openldap/fixup-modulepath, through the addition of the source files: * fixup-modulepath.sh * slapd-ldif-update-crc.sh * update-crc.sh- bsc#1174154 - CVE-2020-15719 - This resolves an issue with x509 SAN's falling back to CN validation in violation of rfc6125. * 0206-openldap-tlso-use-openssl-api-to-verify-host.patch- bsc#1172704 - Change DB_CONFIG to root:ldap permissions. - bsc#1172698 (CVE-2020-8023) - local priv esc via start script chown -R on olcdbdirectory path. Remove chown -R on start to resolve.- bsc#1170771 (CVE-2020-12243) - recursive filters may crash server * patch: 0205-bsc-1170771-limit-depth-of-nested-filters.patch- bsc#1158921 libldap-data should be requires, not recommends to help prevent user confusion around configuration ownership.- bsc#1143194 (CVE-2019-13565) - ssf memory reuse leads to incorrect authorisation of another connection, granting excess connection rights (ssf). * patch: 0201-ITS-9052-zero-out-sasl_ssf-in-connection_init.patch - bsc#1143273 (CVE-2019-13057) - rootDN of a backend may proxyauth incorrectly to another backend, violating multi-tenant isolation. * patch: 0202-ITS-9038-restrict-rootDN-proxyauthz-to-its-own-DBs.patch * patch: 0203-ITS-9038-Update-test028-to-test-this-is-enforced.patch * patch: 0204-ITS-9038-Another-test028-typo.patch- bsc#1111388 - incorrect post script call causes tmpfiles create not to be run.- bsc#1114845 - broken shebang line in openldap_update_modules_path.sh - fix the script- Emergency fix: move tmpfiles_create post from the library package to the main package's post script, which ships the tmpfiles.d configuration. Fixes the post script of the library (-p /sbin/ldconfig does not allow more statements in the script). - bsc#1111388 openldap and /var/lib/ldap/DB_CONFIG* (transactional-update) * source: openldap2.conf - Added a patch to let slapd return the uniqueness check filter used before constraint violation to the client. Fixed broken memory handling in affecting error response of slapo-unique ITS#8866 slapo-unique to return filter used in diagnostic message * patch: 0001-ITS-8866-slapo-unique-to-return-filter-used-in-diagn.patch - Don't require systemd explicit, spec file can handle both cases correct and in containers we don't have systemd.- Fix CVE-2017-17740: when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack * patch: 0017-Fix-segfault-in-nops.patch (bsc#1073313)- Fix slapd segfaults in mdb_env_reader_dest with patch 0016-Clear-shared-key-only-in-close-function.patch (bsc#1089640)- bsc#1085064 Packaging issues have been discovered around the openldap_update_modules_path.sh which has been corrected: - the spec file was wrongly configured, therefore the script has never been called - the script should create the symlinks first, as slapcat is useless on a system which is already affected.- bsc#1085064 Add script "openldap_update_modules_path.sh" which which removes the configuration item olcModulePath in cn=config which is after upgrade from SLE12 to SLE15 holds inappropriate information. If the cn=config is being used on a system, the conflicting items in slapd.conf are ignored, despite of it, the backend DB configuration section has been also commented out in the default slapd.conf. In case of correct cn=config (the olcModulePath has been already removed), the script stops without touching anything.- Upgrade to upstream 2.4.46 release - removed obsolete back-port patches: * 0013-ITS-8692-let-back-sock-generate-increment-line.patch * 0016-ITS-8782-fix-cancel-memleak.patch OpenLDAP 2.4.46 Release (2018/03/22) Fixed libldap connection delete callbacks when TLS fails to start (ITS#8717) Fixed libldap to not reuse tls_session if TLS hostname check fails (ITS#7373) Fixed libldap cross-compiling with OpenSSL 1.1 (ITS#8687) Fixed libldap OpenSSL 1.1.1 compatibility with BIO_method (ITS#8791) Fixed libldap MozNSS CA certificate hash matching (ITS#7374) Fixed libldap MozNSS with PEM certs when also using an NSS cert db (ITS#7389) Fixed libldap MozNSS initialization (ITS#8484) Fixed libldap GnuTLS with GNUTLS_E_AGAIN (ITS#8650) Fixed libldap memory leak with cancel operations (ITS#8782) Fixed slapd Eventlog registry key creation on 64-bit Windows (ITS#8705) Fixed slapd to maintain SSF across SASL binds (ITS#8796) Fixed slapd syncrepl deadlock when updating cookie (ITS#8752) Fixed slapd syncrepl callback to always be last in the stack (ITS#8752) Fixed slapd telephoneNumberNormalize when the value is spaces and hyphens (ITS#8778) Fixed slapd CSN queue processing (ITS#8801) Fixed slapd-ldap TLS connection timeout with high latency connections (ITS#8720) Fixed slapd-ldap to ignore unknown schema when omit-unknown-schema is set (ITS#7520) Fixed slapd-mdb with an optimization for long lived read transactions (ITS#8226) Fixed slapd-meta assert when olcDbRewrite is modified (ITS#8404) Fixed slapd-sock with LDAP_MOD_INCREMENT operations (ITS#8692) Fixed slapo-accesslog cleanup to only occur on failed operations (ITS#8752) Fixed slapo-dds entryTTL to actually decrease as per RFC 2589 (ITS#7100) Fixed slapo-syncprov memory leak with delete operations (ITS#8690) Fixed slapo-syncprov to not clear pending operation when checkpointing (ITS#8444) Fixed slapo-syncprov to correctly record contextCSN values in the accesslog (ITS#8100) Fixed slapo-syncprov not to log checkpoints to accesslog db (ITS#8607) Fixed slapo-syncprov to process changes from this SID on REFRESH (ITS#8800) Fixed slapo-syncprov session log parsing to not block other operations (ITS#8486) Build Environment Fixed Windows build with newer MINGW version (ITS#8697) Fixed compiler warnings and removed unused variables (ITS#8578) Contrib Fixed ldapc++ Control structure (ITS#8583) Documentation Delete stub manpage for back-ldbm (ITS#8713) Fixed ldap_bind(3) to mention the LDAP_SASL_SIMPLE mechanism (ITS#8121) Fixed ldap.conf(5) to note SASL_MECH/SASL_REALM are no longer user-only (ITS#8818) Fixed slapd-config(5) typo for olcTLSCipherSuite (ITS#8715) Fixed slapo-syncprov(5) indexing requirements (ITS#5048)- Use %license (boo#1082318)- added 0016-ITS-8782-fix-cancel-memleak.patch- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Add openldap-r-only.dif so that openldap2's own tools also link against libldap_r rather than libldap. - Make libldap equivalent to libldap_r (like Debian) to avoid crashes in threaded programs which unknowingly get both libraries inserted into their process image. [rh#1370065, boo#996551]- use existing groups instead of inventing new ones- added 0012-ITS8051-sockdnpat.patch- updated 0014-ITS-8714-Send-out-EXTENDED-operation-message-from-back-sock.patch- Added OpenLDAP new feature implementing OpenLDAP ITS#8714 0014-ITS-8714-Send-out-EXTENDED-operation-message-from-back-sock.patch- added overlay trace to package openldap2-contrib- Upgrade to upstream 2.4.45 release - removed obsolete 0010-Enforce-minimum-DH-size-of-1024.patch and 0012-use-system-wide-cert-dir-by-default.patch - added 0013-ITS-8692-let-back-sock-generate-increment-line.patch for supporting modify increment operations with back-sock - added overlay addpartial to package openldap2-contrib- Remove legacy daemon control that was used to migrate from SLE 11 to 12. (bsc#1038405)- There is no change made about the package itself, this is only copying over some changelog texts from SLE package: - bug#976172 owned by hguo@suse.com: openldap2 - missing /usr/share/doc/packages/openldap2/guide/admin/guide.html - bug#916914 owned by varkoly@suse.com: VUL-0: CVE-2015-1546: openldap2: slapd crash in valueReturnFilter cleanup - [fate#319300](https://fate.suse.com/319300) - [CVE-2015-1545](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545) - bug#905959 owned by hguo@suse.com: L3-Question: Are multiple "Connection 0" in a Multi Master setup normal ? - [CVE-2015-1546](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546) - bug#916897 owned by varkoly@suse.com: VUL-0: CVE-2015-1545: openldap2: slapd crashes on search with deref control and empty attr list- Drop binutils requirement; the code using /usr/bin/strings has been dropped in openSUSE:Factory/openldap2 revision 112.- Remove superfluous insserv PreReq.- Introduce patch 0012-use-system-wide-cert-dir-by-default.patch to let OpenLDAP read system wide certificate directory by default and avoid hiding the error if user specified CA location cannot be read (bsc#1009470).- Add more details in the comments of slapd.conf concerning file permission and StartTLS capability.- Test for user/group existence before trying to add them. Summary spello update.- Move schema files into tarball addonschema.tar.gz: ldapns.ldif ldapns.schema rfc2307bis.ldif rfc2307bis.schema yast.ldif yast.schema - Package previously missing schema files in LDIF format: amavisd-new.ldif dhcp.ldif dlz.ldif dnszone.ldif samba3.ldif sudo.ldif suse-mailserver.ldif (bsc#984691) - Fix a minor issue in schema2ldif script that led to missing attribute in the generated LDIF.- Enable build flag LDAP_USE_NON_BLOCKING_TLS to fix bsc#978408.- Move ldap.conf into libldap-data package, per convention.- Move ldap.conf out of shlib package again, they are not allowed there for obvious reasons (conflict with future package).- Build password strength enforcer as an implementation of ppolicy password checker, introducing: ppolicy-check-password-1.2.tar.gz ppolicy-check-password.Makefile ppolicy-check-password.conf ppolicy-check-password.5 0200-Fix-incorrect-calculation-of-consecutive-number-of-c.patch (Implements fate#319461)- Remove redundant -n openldap2- package name prefix.- Remove openldap2-client.spec and openldap2-client.changes openldap2.spec now builds client utilities and libraries. Thus pre_checkin.sh is removed. - Move ldap.conf and its manual page from openldap2-client package to libldap-2_4-2 package, which is more appropriate. - Use RPM_OPT_FLAGS in build flags. - Macros dealing with old/unsupported distributions are removed. - Remove 0002-slapd.conf.dif and install improved slapd.conf from new source file slapd.conf. - Install slapd.conf.olctemplate to assist in preparing slapd.d for OLC. - Be explicit in sysconfig that by default openldap will use static file configuration. - Add the following schemas in LDIF format: * rfc2307bis.ldif * ldapns.ldif * yast.ldif - Other minor clean-ups in the spec file.- Use optflags when building- Upgrade to upstream 2.4.44 release with accumulated bug fixes. - Specify source with FTP URL - Removed obsolete 0012-openldap-re24-its8336.patch- Relabel patch 0011-Enforce-minimum-DH-size-of-1024.patch into 0010-Enforce-minimum-DH-size-of-1024.patch- Upgrade to upstream 2.4.43 release with accumulated bug fixes. - Still build on SLES12 - Loadable backend and overlay modules are now installed into arch-specific path %{_libdir}/openldap - All backends and overlays as modules for smaller memory footprint on memory constrained systems - Added extra package for back-sock - Consequent use of %{_rundir} everywhere - Rely on upstream ./configure script instead of any other macro foo - Dropped linking with libwrap - Dropped 0004-libldap-use-gethostbyname_r.dif because this work-around for nss_ldap is obsolete - New sub-package openldap2-contrib with selected contrib/ overlays - Replaced addonschema.tar.gz with separate schema sources - Updated ldapns.schema from recent slapo-nssov source tree - Added symbolic link to slapd executable in /usr/sbin/ - Added more complex example configuration file /etc/openldap/slapd.conf.example - Set OPENLDAP_START_LDAPI="yes" in /etc/sysconfig/openldap - Set OPENLDAP_REGISTER_SLP="no" in /etc/sysconfig/openldap - Added patch for OpenLDAP ITS#7796 to avoid excessive "not index" logging: 0011-openldap-re24-its7796.patch - Replaced openldap-rc.tgz with single source files - Added soft dependency (Recommends) to cyrus-sasl - Added soft dependency (Recommends) to cyrus-sasl-devel to openldap2-devel - Added patch for OpenLDAP ITS#8336 (assert in liblmdb): 0012-openldap-re24-its8336.patch - Remove obsolete patch 0001-build-adjustments.dif- Introduce patch 0010-Revert-Revert-ITS-8240-remove-obsolete-assert.patch to fix CVE-2015-6908. (bsc#945582) - Introduce patch 0011-Enforce-minimum-DH-size-of-1024.patch to address weak DH size vulnerability (bsc#937766)- Introduce patch 0009-Fix-ldap-host-lookup-ipv6.patch to fix an issue with unresponsive LDAP host lookups in IPv6 environment. (bsc#955210)- Remove OpenLDAP 2.3 code and patches from build source. Compatibility libraries for OpenLDAP 2.3 are built in package: compat-libldap-2_3-0 Removed source files: openldap-2.3.37-liblber-length-decoding.dif openldap-2.3.37-libldap-ntlm.diff openldap-2.3.37-libldap-ssl.dif openldap-2.3.37-libldap-sasl-max-buff-size.dif openldap-2.3.37-libldap-tls_chkhost-its6239.dif openldap-2.3.37-libldap-gethostbyname_r.dif openldap-2.3.37-libldap-suid.diff openldap-2.3.37.dif openldap-2.3.37-libldap-ld_defconn-ldap_free_connection.dif openldap-2.3.37-libldap-ldapi_url.dif openldap-2.3.37.tgz openldap-2.3.37-libldap-utf8-ADcanonical.dif README.update check-build.sh- Upgrade to upstream 2.4.42 release with accumulated bug fixes.- Upgrade to upstream 2.4.41 release with accumulcated bug fixes and stability improvements. * Add patch 0008-In-monitor-backend-do-not-return-Connection0-entries.patch * Remove already applied patch 0008-ITS-7723-fix-reference-counting.patch * Remove already applied patch 0009-gcc5.patch (Implements fate#319301)- Add 0009-gcc5.patch to pass -P to the preprocessor in configure checks for Berkeley DB version- binutils is required for "strings" utility invocation in %pre [bnc#904028] - Remove SLE10 definitionssheep14 1645525454 1.2-9.61.11.2-9.61.11.2-9.61.1check_password.confppolicy-check-password.lappolicy-check-password.soppolicy-check-password.so.0ppolicy-check-password.so.0.0.0openldap-ppolicy-check-password-1.2LICENSEREADMEppolicy-check-password.5.gz/etc/openldap//usr/lib64/openldap//usr/share/doc/packages//usr/share/doc/packages/openldap-ppolicy-check-password-1.2//usr/share/man/man5/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:22971/SUSE_SLE-15_Update/4813f72fb7787c6adb9f6f23c61bbcf5-openldap2.SUSE_SLE-15_Updatecpioxz5x86_64-suse-linuxASCII textlibtool library fileELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=a81956cd64b3f94d390453bffcdf4d56f1c3995b, strippeddirectorytroff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)PRRRRRU"J8cracklibcracklib-dict-fullutf-835bde80f8be0d829761665e909ef465e51b8293fdf1309600546055a1537c0fd?7zXZ !t/_(] crv(vX0Y6ڨumEh8Ǿ[aJi Ib4GU@GmBd uC)޷qdv3H삻.>,ӸQ鏗JQ4F#:_^,:nE(U`MZR=! )$R=:꿠КQT8&:9E (̲33XM3_ yejelV0!"Dp Z`HŨ=gAyϳ$6uP ڛ:]JiVdɖ۹gk$6M"_W-9\BS76+;БpXye11wV3ϻ qQ$_UZ0jgj<anVƕ*VM/uKgq:RTxX7$ȪeacxSlxvk;*$v_36!-^&SA#g/0SMvjK~>0z6=])%һEptSLA[Eڃ-1 x(((Iri)ƟcoܬH %-k\+ςȬ1h3Ll(Dj?Oc(л7dz&i謕SzI$r0@⌼7X_[IbTiZN_Af7_toq֤Ck\]**2 )%`` L ߷殚lZCvS 7;济j_+C&kp`1,!4f ( [#!5֪IHk Ue tisÁK j@[RSl#]{iSqQp/Aڏֆ=E~/F16z͏mx.WcC g`1ԁAuGmV:F腽]lmr>*ΙnۗBÓFt- U}kC_,j9 Ld-9*\bN?CΓ*Ͼ5hP}4;Cl xICN S<2r2U <0pޠ)nt[dt{udm&`+M]1O0 !B%iu8pE\yщEw)=3]0TVp*ZxPw 1#2ɬr8$T^@IKN"3\,Em_q-'<ֽ_ _n/9A=t K;_NDq4h--Ny+0zkY!ඬw_!.TK:j0ʖ%=#1Hbtݨ4"䭟pܸB@9H#f tAߨZV3[? =v2RC_a(j$%µ֊yTo7 :T^CHy ֝pwjgԑ5w*E߭difcICaiېwLz`G1;jI/<ګp92ccxAwqk~mczXvB}ICe,Y$TNë~ X=ũ9|UT?Yygya s*5GTߋ0oy > z*9q\w96v/n2ToCԬɹ6b? }q:<RՏ&.G&d8U(h== 6nwGh`5Zܰ]~б۫GSg|u"Dx8v737`81V\#JJSgc$Fm1N UlPsX<R{Cq'ohm,sp<߮-?)apnMh @W+΋6/|a~5,J3EHΙ z ycT vrW"d{#܀8 LFWs:cbjہy-(Ҹ"א~ /_iYėoUo_}Mڹ' 1qfBփy`/I_¢&fKNsH&h[N 2ãTڈȏCt2tYLW_gE_Z6.2+aw XQ$~ܽhYzJџSPn@hnvц@i5׿znH"%Oܝ./$Fu޼ Akm+qjc^ (d\GMΌRV5 I,u)BBGhT ~.7+JǠX9amNxCc66@>/3v*ZN+!I[vg9s5xd4y4*6a^bVw䶍s̻Vg~Mn0>yfw[8/$̎':x3 |y>X+{ b!{TA/ @~jv^{";upz>mzQ+WZ6yhPit`zx<gF*8r]* ZUQMktY bw`zJئ}v|#Hߐp8}iT"ڒj3sVYvߔD1]Unxhce}fSoR~54$YQ=A(<)EVd ο \鈮!Fd&- )r׾Z,?ԝCGi\m&6=O>;oճX膙~3m`(}w3ގqmmo4k@P+:t's!r=~[@qgM UC:ri_Vґ>:ǷWJG6Cfn/.z7G;(Zx 50ğu1+?:!'B *AC 0UIYJ%.p-CCE(o_;@R)6& o37d.u%*ڮTE$}cu?Q‚F=G+(Q!9ÙY_ݡqm :|Ug8 w:fDrIm&Kg! u) 7@-KPHPbPY駜ݷ VmZG;A@@~ T05Nadl,qJϝ씡6f[Y fԓ7= 9Ll$r0t`-26 DN_ wpwA#EIa8&. y7L~!e>1âq{OoP Z%l)|.j#p\q#fxܱs}fM#:Ci}7Dҭ/wsw'Y t- e{@tE0s 4T1m'+@>FpZ/u@O#qkK*@dZN)?ӓ:j/= ;% _>f+i;%oC.δ?ɧ@Y.T/ 2Yrd4]krVnh|a~T>7JJ"(`L\U&S!daCxRiIBe(cVڣP2z@oa uwd8˝(]) 8iP;PP3+?_nVsB2Yq8wugxJ8Wv"UƉ C"Eq5n? 9;ҙCX?@Uas f eHHD4s?d*ej@e[Z}l-~]_&z/W*e:0l[% ٩.}S +ஸ=RND5ۺy=uxKzHB@lՌo譯LBBN ƙn䎉'.Tz9_p X핰dIB|n?k{vV 9@8c M+x 1lӺ::V;>6wU rK!Ra效},<֌A,}V~/)([&a{۪I؟Kf8kD 9\0𦏓T1+W¯Mpļ˘+!EA J.+5;M,)Y1M%4 ImbZ 60yU&4;:x3`)46PԺ2-Jb"#f }3_99)pvv)hf A1dzJ'ǖ͜T#'oI|YO߆x*-Lׄz+m ;#LZYy{QBLSyHKyOFG) TP-_!$ȡus?)Cl2[[7H_I/A'P Dtw-#mxt$=vd:tH4l-1ha7#I"<Lk{M#ǟYc/($($91XTw++1nv2CM0/oBE9#,QQRp\ߪ% 1CnP%B#AA+琿`0 9hR8 ͟8kVFؼ ߀WV넩R7Iفq͎C 2 4RɊ6.c{j( MqGVNS[xHUL3{x#z 4Zel?"m?J2zlD{ByŨ`6Y*KuGD :̢{}@d{3YvKEEWC E đ+ w7rgN9ݍ,`!cqSc%v=4Pڧwx! |Aܱ&KL.l8&>ă:zϜxzGF;|^v:Pfʽa86<٨zIOii;}|"qx̐TQi#?}oR$ȓ +.2)XVvtDSբhTܠ€t5~\7i|DPo tLot%?0t(FSNX;eHk~{u\>+QTUj'](O^SIy2| KQ8kI,*>GOC%q249n jMiG#b- o/ZcdqO=f~m7[y tΏ-Zt6Z?CO #NdWkZwe|S-YpFiX_?T(F ~ 4[fCB7&̖F!F!e*bL7L^qܚf34%^W z|b P8*ٖǸP@n"{i 5}C99hRD27x񬭘ܟ1PR@3]kAFl4ϼԁf͑R6$ ʮD膻u --A0;;䮬Zυp7`;ɲUEof>|[.L~%}ۍ%)0ԁf>䔓M,V"`OҢ@|źΤ"k>\vcY#f?\ -;P^ŗ-GxK9,.M R4xert+}y?l` , i=Tdg['`ȚZ7 IE~ΠO'KA%s=cYz0;dEꘇ:8yQMѠYPv6_]/Ѹ_D w)(+DĢ%3r րuvS{+,q$~Y?VddO96N5!K F?C.k=zV_oT܉rwh@Xl, n$~v P8Ԡ3y8!xT#Q inxw~O W}k֜E=$a2Y"0A]1KW h$Fw+ٴsŐ(2F lwzHtiﮧ8MGfQ~R$iĵ6$;1|&S#yjI!I8$#]<$fvï߾^UmAKDwTֽc+ϝ`}Bj TNQŷ+Ml܅drHm҇"dGOX:TŠ(uLh+?._PUԸQͺ`?_4G%'x(rשnGawJwJ.YjP62/tD1PC&S P{@/q0'8)ORчޣ֕0nx@w-žy7E̲n/вآc9HVe0p_s-[o< 7Ne4j3Ħ5z["] }NGj-m)鎜B<0ªM#jY*t B#ho8-ק|Kw9Ф( 뫓1ktI1ߟ](^/qȶz2W]NVu+3´\đLV|L9ƕzTQ,(*[x2 ʱFb!IY $A)"U#S5Y[nwt'fll>`L+eTQ*I@ 06Awnq8m?e;t ^R~1։ye6wrN|7f$GaT+ΖS mw^' 6/o)QtrqjԐ'O1e\{=7R__#@Eܹ̕ӻWlH-UqrS֬?HJ 财TKgT3 '2?:mI*-zi-*zLΔ"j^v1zX/)6Z^2`>L{Wkވ|dN>ZȪd]2piN9_x)Gġ{JUn !*ooZq j;Xe+n+VrB±_Z쎧pӐ~xQ};GFLc8T }VVㆇE?SZ%Z&7/pQ8)ꕻ3OFF/ЦcK*Ӊȍythrf8Lw T#xF#~i"ZY H YKGǭP,((>Cpufmbq]3P;"Խq9j$F˿&ìqNd>r ɹ2 ۀV|_.2}+dCH v]ZGjPh #+~1\'"EzWܛP/9g:(MHz֨Osǁf#O`wEn ,]R%m]5={Կb `d2NL}&ٗ{ia;g! HҔG˱تG÷ W1+BAX4)[C4GO~*hAP[ 62#)_0쇲CCe i@04={IJ톐xF{] }IgP(g ^8Y HF*ƺ`j=떾îVZGgRBQT6E2.uXH]fC w{X'f#65/ڕWSZj`ٴX.aIbΨ{Š?B[nj}vwzx܏+rvDa?3;pN Xhe붹_vV .6޹KvH'+$yfzV6Mw :?-ejhwR='2jo$Ol\7>XS;FdآFR5 YZ