libvbr2-2.11.0-bp154.3.3.1 4>$  Ape- !M@eeeSX15.5*z f:Ĥ,00$$xVϵZ~]ZV62NHuEh,+ WD~;'ęVЮ;3}j:v1 =M KqTj09Po܇/DIcWĢ+|~b &D7($KX894NςڜbhP C3 J9Z0Pʈ"4?>_\P _r1d4a80e2b361890fb286bbb42ca3844bda19061570a653a00fbefb34b86fb36c27f5a7547af1fa6809485964bd3ecdd0243431e3E e- !M@eee <Ðb/Fn'A)$tfO!A_@2ns+/j䦡O_,cXRG0߇u';t2g]ʧ2݂tLՋ7.omyi] :DU8Wݖr9Co56ke 1DȪOޅRq3YG67K[- =!•FCu tCrߐ'~qwGW1m%+M Q~ Aɽ.\>p@'|?'ld   Q *CIPX \ ` h  4 ` e (89:>$-@$<F$KG$`H$hI$pX$tY$\$]$^$b$c%~d&&e&+f&.l&0u&Dv&Lw&x&y&z' '' '&'hClibvbr22.11.0bp154.3.3.1Library for assisting in Vouch By Refence functionsThis package provides the shared library libvbr which assists in Vouch By Refence functions.e- s390zl24[ SUSE Linux Enterprise 15openSUSEBSD-3-Clause AND Sendmailhttp://bugs.opensuse.orgSystem/Librarieshttp://www.opendkim.org/linuxs390x[ e- ge- g3118ce3d5e92df3d939481b337d679d50925dfe0d6f183edf35b35a4132c437clibvbr.so.2.0.0rootrootrootrootopendkim-2.11.0-bp154.3.3.1.src.rpmlibvbr.so.2()(64bit)libvbr2libvbr2(s390-64)@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.4)(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.2)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3e)1@amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Ferdinand Thiessen Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Add fix-RSA_sign-call.patch * Fix bsc#1216117 * Fix call of RSA sign on big endian systems, patch origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial package/sbin/ldconfig/sbin/ldconfigs390zl24 16974508902.11.0-bp154.3.3.12.11.0-bp154.3.3.1libvbr.so.2libvbr.so.2.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protectionobs://build.opensuse.org/openSUSE:Maintenance:18120/openSUSE_Backports_SLE-15-SP4_Update/49d8527c7d2f80af89294fbc5533b921-opendkim.openSUSE_Backports_SLE-15-SP4_Updatecpioxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=3853f7d802491554d7ca74aa169b768150de1fa5, not strippedPRRRRRm~YՃPutf-8f67698071ba68fee5f43f11e0bae1259faa5dfd8b0da0c413e86922382638092?7zXZ !t/\'] cr$x#I|[T‰QlKW`4@jWK[PJ ͽ&0ʶ4<~q X%dxhyj'ց9;QvZ)w=nV8K,GQۦt1YCo ᅺ 9\Y 3)A#D.71ःwtswAH JIx*~-gI&= NXl`ͣ oa bKk Hv]$*D~^HQHsǦg G?_oKXRG#ڶl{u4ZhRu6@~5d 6엔y2[^+f{JGvu Α\3!^qǞ/aQYPsͰ)ݙ=ex.Fo1( kh?B2h T!O;uN~?[tz}F^Rs9G2бH֠!  8^&As=8ytՁpbZG-BYkޢGf`n@P9ơRěK|2.$ND5{ӤGSVgG ޟ &X_c>ϵ[{S0ط=DWFd`P;7  mmSt#IgfgHo;:G.4Xw#/ RA$X3o.5tl\ca{?N1IPu\ euH+Bg8?}!/OiwE$<^pKwRufݿ=_#"zZE$ u |b Cp #Iq.j\ d[Kq-JSurnϞ_Fs"gL iCder.GOPGG"\sTEIi܏c`@gU,ox/xR(o=|2c<甇Ր4[ɳ3VF{NU.4snCL.u19Qiڲу}CSCjhƴ:orJ\+B$;Gkj`N|YrfRmR_f [5j7EDuu5L#¥wTgbH5i!0hh{ XiCQ -%ZVaX ;q63sӡ\' ;Х_C~| Ɂ6>ψG;Irp\]'tci2%1ʽ%h4-vRx3 uwbuϻN? vcngSxWg6o6_ؑ$^A 1I7"9@ڃy qlΧã&+^K7u7-݃:43d~D$)#0%9#Ԩ&"za ESQkњ(TN8vº[(J)m+FU9N )!["-uۘ@͝OTXAM¡_Cm>s4|uNY$YWyJh:HUjCh$g6Α Otb+Y$#WUMz^S G_E Z2a=vWv7tz ƻB,CQV.j( !QmP|0£W&+HШQ>1f16i0w3kHDM\ I|ԬHJ) gZNq rn+ޛ:V^^<0 j){_精݅xk;ԕ q^WJm'%:y~ARE^#b~F9 i *h?QȒu8va,X_ H#'p9"KSPͭ #>ùxRd~Qm]q ,(LB-nC)"&i_߈bG D*?SsZ>Z; _J[:+CJњv ޢD!Df/qK(>iɾ6JĹw*Z 8$1Kt6{R.f{W ۛ>JCRe6/D( nvj=:ydQzpЀ Oׇ!PMF7ҟQsy xb5v&'Euw/27*}7XX"MrdRC^'QXY@ëI/;,2ig-XyҼ}p zTmئ/"H{n"OqC2X#cp!MuLR`IB)s)(*9vYK5+h?b4g67T,D-`:]6O(UPn/"qk~qR*+693n| /u\mr7 mhAPRpzoc9s''P<\X#Pzo)<5>tQ۱+U%pT7 i.=ZMfk3F"U{qfK}yoEWIs~ڷ @~ {}n]S++qIBV]Ո*MIs;\UQbhq 0h?3u-NI.ɉ2"uQѠ ~n=Pk>ŇL^zqwTq}.6蟘44Ds$}ch6Lu+L 27>bW$P^ a'"2n}d4O (uVo ID*W@5 d+*?/c$/9Ef7.L- !O@>rß8 |K_)icmkyTeO8|*Os3Vq J4DtAIo8P46S2Á'&vNBpa6o&7dΧbXzvԍR(5YzQuyBw\5*"<ZM vrK56-Gd%$\( N%hACڠh;AzM%M5zzLԽK)8m C! tdZۛꈰwH"ң cy.VI oÌ!M)un@ӊ)K3&Eʻ H"( [h2MS@M׎/- ~`]4]0}kR)J|; gTx*KCԯPWn'LŊݔ2Tg['QӥѴl/hh`䞁u\Y%Rp'-KYZC 6Y<ꋑ?>9TΝ]r4c R)+df s/2e*|ZsaPo.&7 N&a^|y*' + bOZ4y4 vraCRDx"@{Wsd~5H(pw%w) .5 #9,!5?AϪyo|`-ZǣݨSiU)=/DNefbWόG#t+[>@'\uG0R,BDHDߔ`7;t>7Qx$@* ht_~!W +5;Cs+2a{#.h1cGPwX(ȱUunk$* ?4!Tɩ D*5j!6|u顢>٤bbZ/%d௠7ygk 1{yyBh?"qj.L̆Ea!y@9qwzꯚG!ȻWg=òϥN~nF-#7 …=A8sMt5x6?{v/m*oV" >+29f4C"W^!i&qzr >օicDaa貢EiS e4h{6gܫơK]i6qM?bܐ1;5ޥ7} 2}j֔賱jr-7e^*T:h'՝`v#K?}?ܵ0qF>̝"dV5-»j*y&(o k!̃25>yV';LY!Y9}C&SA*cKԅrV{4J 82qW*~*pEȍ3@}e48?w4OSzQ8G$G<3g% iN!\8&tP,m3q=DQλҴBϴeZ},V5COUC1=E(!cN_-mWΔʰ(,f],O07[uPHŒ{wU-EyVA22ɔŶ YZ