freerdp-server-2.4.0-150400.3.20.1 >  A eGp9|#/TCtG5Qe j1]|HxHi^_Q?'s& Kĕ%uy՗5/s"E 5Ee`"%En0$+ȑ .af^ҭ*/f}:4pp-}-<GLQ?+0@ӴhVb WdLjXo{b GF{F8A6YCz|& U3#6937e6a0ad421e8a18448c6e5ad3ede6b0a0f238c743acd6aa018c3716400ecc04e004cc750882fc8f36eede30bb995ef0202481eGp9|,cWݡڌSޙm߫DrɈdS@t /Y&HAKs񁧫tV*@9|(Cbp@&23)ERO Ut*AZ\vY[]a+lϧcz\4jPD*@꽭,el[27 ȗ}t0!{O&򀄱+?-#[ĝ7]x_vIGPo*69Fi3P*QqH9,rշQ)>p>jP?j@d % ; .9 Om    b h H ] (819L1: ]1Fd!Gd<HdTIdlXdtYd|\d]d^e%beDcedfoeftffwlfyufvfwixiyi ziiiij<Cfreerdp-server2.4.0150400.3.20.1Remote Desktop ServerThis package contains a server-side implementation which can export a desktop via the Remote Desktop Protocol (RDP) following the Microsoft Open Specifications.eGaibs-power9-11&SUSE Linux Enterprise 15SUSE LLC Apache-2.0https://www.suse.com/Productivity/Networking/Otherhttps://www.freerdp.com/linuxppc64lePHH+z큤eGUeGUeGUeG&eG%eG%fe9340f41386a57e4faae4c1fccf9872165fdc2376d56aa4bfe92057cf05bbdb8fadb5e12a33a55ab79ab0472b973b7da0ff5fd0b5c64ac9c18f6037d4778e161d673be015571f622ed29b02e959bc89d95dcaf4a5e519cf5740206c3b96237e694eaf048080ab255e5ec9e116720ca860c432739f6849216d1c48eae4e4739e5707d7ec036b78e7476e9e61d051b74b5a7f2135a8da63666a70bec09760769cebf11980ae6e914162192a85cefcb7d0763fa50cacab48c48932a3377370d144rootrootrootrootrootrootrootrootrootrootrootrootfreerdp-2.4.0-150400.3.20.1.src.rpmfreerdp-serverfreerdp-server(ppc-64)@@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libfreerdp-shadow-subsystem2.so.2()(64bit)libfreerdp-shadow2.so.2()(64bit)libwinpr-tools2.so.2()(64bit)libwinpr2.so.2()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3c=@cEc\cN@bL@b@a^@a]aEaD@aD@aA@a@a`OL@`<@`7@_@_^@^@^^^I^@^@^T@^^t@]@\@[@[j@Zz@Z@Z`@ZkZWQZY@@YKYKY=0Y;@X~@XW local * #gh:FreeRDP/FreeRDP#6985: Support newer FFMPEG builds * #gh:FreeRDP/FreeRDP#6989: Use OpenSSL default certificate store settings * #gh:FreeRDP/FreeRDP#7073: Planar alignment fixes- Updated to release 2.3.2 Noteworthy changes: * Fixed autoreconnect printer backend loading * Fixed compilation on older mac os versions < 10.14 * Fixed mouse pointer move with smart-sizing * Added command line option to disable websocket gateway support * Fixed drive hotplugging issues with windows * Fixed smartcard issues on mac Fixed issues: * #gh:FreeRDP/FreeRDP#6900: Transparency issues with aFreeRDP * #gh:FreeRDP/FreeRDP#6848: Invalid format string in smartcard trace * #gh:FreeRDP/FreeRDP#6846: Fixed static builds * #gh:FreeRDP/FreeRDP#6888: Crash due to missing bounds checks * #gh:FreeRDP/FreeRDP#6882: Use default sound device on mac- Updated to release 2.3.1 Noteworthy changes: * This is a compatibility bugfix release readding some (deprecated) symbols/defines * Also add some more EXPERIMENTAL warnings to CMake flags as some were not clear enough. * Fixed a memory leak in xfreerdp (mouse pointer updates) * No longer activating some compile time debug options with - DWITH_DEBUG_ALL=ON which might leak sensitive information. * Added -DDEFINE_NO_DEPRECATED for developers to detect use of deprecated symbols- Updated to release 2.3.0 Noteworthy changes: * Websocket support for proxy connections * Progressive codec improvements. Reduces graphical glitches against windows and ogon servers * Fixed +glyph-cache, now working properly without disconnects * Huge file support in clipboard * XWayland support for xfreerdp (keyboard grabbing) * Improved wlfreerdp (wayland client) * Option to allow keyboard scancodes to be remapped manually * Improved mouse wheel behaviour when scrolling * Improved dynamic channel behaviour, more stable event detection * New connection state PubSub notification: Clients can now monitor current connection state Fixes: * gh#FreeRDP/FreeRDP/6626: Fixed parsing of FastGlyph order. gh#FreeRDP/FreeRDP/6624: Added support for xwayland keyboard grab gh#FreeRDP/FreeRDP/6492: Added clipboard CB_HUGE_FILE_SUPPORT_ENABLED flag gh#FreeRDP/FreeRDP/6428: Improve NLA error code logging. gh#FreeRDP/FreeRDP/6416: Http gateway message support gh#FreeRDP/FreeRDP/6753: List of pull requests to backport for stable-next - Added freerdp-rpmlintrc to supress a false positive as gethostbyname() is a windows-function call not a unix one.- Updated to release 2.2.0 (boo#1174321, gh#FreeRDP/FreeRDP#6381) * SECURITY: CVE-2020-15103 - Integer overflow due to missing input sanitation in rdpegfx channel * Sound & mic - filter GSM codec for microphone redirection (gh#FreeRDP/FreeRDP#6263) * windows client title length (gh#FreeRDP/FreeRDP#6335) * "Alternate Secondary Drawing Order UNKNOWN" (gh#FreeRDP/FreeRDP#6370) * remoteapp with dialog is disconnecting when it loses focus (gh#FreeRDP/FreeRDP#6298) * v2.1.2: Can't connect to Windows7 (gh#FreeRDP/FreeRDP#6299) * fix: memory leak in nsc * urbdrc: some fixes and improvements * build: use cmake to detect getlogin_r, improve asan checks/detection * server/proxy: - new: support for heartbeats - new: support for rail handshake ex flags - fix: possible race condition with redirects * Drop upstream fixed patch: freerdp-CVE-2020-15103.patch - Removed freerdp_Mask_CACHED_BRUSH_when_checking_brush_style.patch- Drop BuildRequires of libavcodec for Leap/SLE (bsc#1174200)- Added freerdp_Mask_CACHED_BRUSH_when_checking_brush_style.patch which fixed frequent crashes described in boo#1173605 and gh#FreeRDP/FreeRDP#6298- Updated to release 2.1.2 (boo#1173247) * CVE-2020-4033 Out of bound read in RLEDECOMPRESS * CVE-2020-4031 Use-After-Free in gdi_SelectObject * CVE-2020-4032 Integer casting vulnerability in `update_recv_secondary_order` * CVE-2020-4030 OOB read in `TrioParse` * CVE-2020-11099 OOB Read in license_read_new_or_upgrade_license_packet * CVE-2020-11098 Out-of-bound read in glyph_cache_put * CVE-2020-11097 OOB read in ntlm_av_pair_get * CVE-2020-11095 Global OOB read in update_recv_primary_order * CVE-2020-11096 Global OOB read in update_read_cache_bitmap_v3_order * Gateway RPC fixes for windows * Fixed resource fee race resulting in double free in USB redirection * Fixed wayland client crashes * Fixed X11 client mouse mapping issues (X11 mapping on/off) * Some proxy related improvements (capture module) * Code cleanup (use getlogin_r, ...) - Removed obsolete upstream patch freerdp-bug-6205.patch- Updated to release 2.1.1 (boo#1171441) * CVE-2020-13396: GHSL-2020-100 OOB Read in ntlm_read_ChallengeMessage * CVE-2020-13397: GHSL-2020-101 OOB Read in security_fips_decrypt due to uninitialized value * CVE-2020-13398: GHSL-2020-102 OOB Write in crypto_rsa_common * Enforce synchronous legacy RDP encryption count (#6156) * Fixed some leaks and crashes missed in 2.1.0 * Removed dynamic channel listener limits * Lots of resource cleanup fixes (clang sanitizers) * A couple of performance improvements * Various small annoyances eliminated (typos, prefilled username for windows client, ...) - Removed freerdp-bug-6175.patch and freerdp-bug-6207.patch because included in upstream- Added freerdp-bug-6205.patch to fix reading newline on certificate accept gh#FreeRDP/FreeRDP#6205 - Added freerdp-bug-6175.patch to fix Certificate Checking Recently Broke gh#FreeRDP/FreeRDP#6148 - Added freerdp-bug-6207.patch to fix Abort on first possible certificate validation error gh#FreeRDP/FreeRDP#6207- Updated to release 2.1.0 (boo#1171441) * Fixed CVEs: - CVE-2020-11039 - CVE-2020-11038 - CVE-2020-11043 - CVE-2020-11040 - CVE-2020-11041 - CVE-2020-11019 - CVE-2020-11017 - CVE-2020-11018 * Fixed leak and crashing issues: - gh#FreeRDP/FreeRDP#6129 - gh#FreeRDP/FreeRDP#6128 - gh#FreeRDP/FreeRDP#6127 - gh#FreeRDP/FreeRDP#6110 - gh#FreeRDP/FreeRDP#6081 - gh#FreeRDP/FreeRDP#6077 * Noteworthy features and improvements: - Fixed sound issues (gh#FreeRDP/FreeRDP#6043) - New expert command line options /tune and /tune-list to modify all client settings in a generic way. - Fixes for smartcard cache, this improves compatibility of smartcard devices with newer smartcard channel. - Shadow server can now be instructed to listen to multiple interfaces. - Improved server certificate support (gh#FreeRDP/FreeRDP#6052) - Various fixes for wayland client (fullscreen, mouse wheel, ...) - Fixed large mouse pointer support, now mouse pointers > 96x96 pixel are visible. - USB redirection command line improvements (filter options) - Various translation improvements for android and ios clients - Removed upstream patches fix-freerdp-2.0.0-usbdk-build.patch and fix-URBDRC_DEVICE_ADD_FLAG-definitions.patch- Updated and reviewed make command and added fix-freerdp-2.0.0-usbdk-build.patch to fix boo#1169679 and make USB working again - Fixed build for SLE_12 - Cleaned up spec file- Add fix-URBDRC_DEVICE_ADD_FLAG-definitions.patch in order to fix boo#1169748.- Added cairo support for scaling - Cleaned up spec- Removed patch freerdp-Fix-realloc-return-handling.patch - Added pkgconfig(libusb-1.0) for building - Added new package for freerdp-proxy - Cleaned up spec file - Updated to release 2.0.0 * Fixed CVEs: - CVE-2020-11521 - CVE-2020-11522 - CVE-2020-11523 - CVE-2020-11524 - CVE-2020-11525 - CVE-2020-11526 * Fixed security related issues: - gh#FreeRDP/FreeRDP#6005 - gh#FreeRDP/FreeRDP#6006 - gh#FreeRDP/FreeRDP#6007 - gh#FreeRDP/FreeRDP#6008 - gh#FreeRDP/FreeRDP#6009 - gh#FreeRDP/FreeRDP#6010 - gh#FreeRDP/FreeRDP#6011 - gh#FreeRDP/FreeRDP#6012 - gh#FreeRDP/FreeRDP#6013 * sha256 is now used instead of sha1 to fingerprint certificates. This will invalidate all hosts in FreeRDP known_hosts2 file and causes a prompt if a new connection is established after the update * First version of the RDP proxy was added (gh#FreeRDP/FreeRDP#5372) thanks to @kubistika * Smartcard received some refactoring. Missing functions were added and input validation was improved (gh#FreeRDP/FreeRDP#5884) * A new option /cert that unifies all certificate related options (gh#FreeRDP/FreeRDP#5880) The old options (cert-ignore, cert-deny, cert-name, cert-tofu) are still available but marked as deprecated * Support for Remote Assistance Protocol Version 2 [MS-RA] * The DirectFB client was removed because it was unmaintained * Unified initialization of OrderSupport * Fix for licensing against Windows Server 2003 * Font smoothing is now enabled per default * Smart scaling for Wayland using libcairo was added (gh#FreeRDP/FreeRDP#5215) * Unified update->BeginPaint and update->EndPaint * An image scaling API for software drawing was added * Rail was updated to the latest spec version 28.0 * Support for H.264 in the shadow server is now detected at runtime * Add mask= option for /gfx and /gfx-h264 (gh#FreeRDP/FreeRDP#5771) * A new option /timeout was added to adjust the TCP ACK timeout (gh#FreeRDP/FreeRDP#5987)- Disable LTO on aarch64 and %arm to fix build- Add freerdp-Fix-realloc-return-handling.patch: Fix realloc return handling that results in memory leaks (boo#1153163, boo#1153164, gh#FreeRDP/FreeRDP#5645, CVE-2019-17177, CVE-2019-17178)- Add Requires: lib%{name}%{major_version} = %{version}-%{release}: freerdp should depend on the same release of libfreerdp2 (boo#1129193)- upgrade to version 2.0.0-rc4 (FATE#326739) * Fix the following issues: - CVE-2018-8784, boo#1116708 - CVE-2018-8785, boo#1117967 - CVE-2018-8786, boo#1117966 - CVE-2018-8787, boo#1117964 - CVE-2018-8788, boo#1117963 - CVE-2018-8789, boo#1117965 - CVE-2018-1000852, boo#1120507 * Security and stability improvements, including boo#1103557 and boo#1112028 * Refactored ntlm_av_pairs API * gateway: multiple fixes and improvements * client/X11: support for rail (remote app) icons was added * the licensing code was re-worked: Per-device licenses are now saved on the client and used on re-connect: WARNING: this is a change in FreeRDP behavior regarding licensing WARNING: this is a change in FreeRDP behavior regarding licensing. If the old behavior is required, or no licenses should be saved use the new command line option +old-license (gh#/FreeRDP/FreeRDP#4979) * improve order handling - only orders that were enabled during capability exchange are accepted. WARNING and NOTE: some servers do improperly send orders that weren't negotiated, for such cases the new command line option /relax-order-checks was added to disable the strict order checking. If connecting to xrdp the options /relax-order-checks *and* +glyph-cache are required. (gh#/FreeRDP/FreeRDP#4926) * /smartcard has now support for substring filters (gh#/FreeRDP/FreeRDP#4840) for details see https://github.com/FreeRDP/FreeRDP/wiki/smartcard-logon * add new command line option /smartcard-logon to allow smartcard login (currently only with RDP security) * add support to set tls security level (for openssl >= 1.1.0) - default level is set to 1 - the new command line option /tls-seclevel:[LEVEL] allows to set a different level if required * new command line option: /window-position to allow positioning the window on startup * client/X11: set window title before mapping * rdpsnd/audin (mostly server side) add support for audio re-sampling using soxr or ffmpeg- upgrade to version 2.0.0-rc3 See: https://github.com/FreeRDP/FreeRDP/milestone/9?closed=1 * Improved and cleaned up the command line interface * Fixed automount issues * Fixed several audio and microphone related issues * Implemented AAC and MP3 codecs * Added Wave2 support * Addedd dynamic resolution with full screen toggle support * Improved redirection handling and certificate issues * Improved automatic reconnects * Improced connection error handling * Fixed invalid pointer, double-free, integer underflow, buffer overflows issues as well as other memory leaks * fixed X11 Right-Ctrl ungrab feature * winpr: Updates time zone data to April 2018 * added libressl compatibility- removed SLE11 condition - removed no_connection_to_windows_10_17101.patch - removed -DBUILTIN_CHANNELS=OFF switch - explicitly set -DCHANNEL_GEOMETRY=ON - Disable the new X264 and OPENH264 codecs because openSUSE does not provide them - upgrade to version 2.0.0-rc2 See: https://github.com/FreeRDP/FreeRDP/milestone/8 Noteworthy features and improvements: * IMPORTANT: add support CredSSP v6 - this fixes KB4088776 see #4449, #4488 * basic support for the "Video Optimized Remoting Virtual Channel Extension" (MS-RDPEVOR) was added * many smart card related fixes and cleanups #4312 * fix ccache support * add support for memory and thread sanitizer * support for dynamic resloution changes was added in xfreerdp #4313 * support for gateway access token (command line option /gat) was added * initial support for travis-ci.org was added * SSE optimization version of RGB to AVC444 frame split was added * build: -msse2/-msse3 are not enabled globally anymore Fixed github issues (excerpt): * #4227 Convert settings->Password to binary blob * #4231 freerdp-2.0.0_rc0: 5 tests failed out of 184 on ppc * #4276 Big endian fixes * #4291 xfreerdp “Segmentation fault” when connecting to freerdp-shadow-cli * #4293 [X11] shadow server memory corruption with /monitors:2 #4293 * #4296 drive redirection - raise an error if the directory can't be found * #4306 Cannot connect to shadow server with NLA auth: SEC_E_OUT_OF_SEQUENCE (boo#1085416, boo#1087240, boo#1104918, CVE-2018-0886) * #4457 Fix /size: /w: /h: with /monitors: (Fix custom sizes) * #4527 pre-connection blob (pcb) support in .rdp files * #4552 Fix Windows 10 cursors drawing as black * smartcard related: #3521, #3431, #3474, #3488, #775, #1424- Fix boo#1090677 activate pulse optional component- Added no_connection_to_windows_10_17101.patch to fix Windows-connection-problem after Windows march 2018 updates. This fix is related to boo#1085416- Do not use xorg-x11-devel, instead buildrequire individual x components. - Only attempt to ge rid of __DATE__ and __TIME__ if SOURCE_DATE_EPOCH is not set.- Users can connect only once wo windows sessions due to [#]gh/FreeRDP/FreeRDP/4348 Therefore WITH_GSSAPI has been disabled until that issue has been solved- Updated to 2.0.0-rc1 Noteworthy features and improvements: * support for FIPS mode was added (option +fipsmode) * initial client side kerberos support (run cmake with WITH_GSSAPI) * support for ssh-agent redirection (as rdp channel) * the man page(s) and /help were updated an improved * add support for ICU for unicode conversion (-DWITH_ICU=ON) * client add option to force password prompt before connection (/from-stdin[:force]) * extend /size to allow width or height percentages (#gh/FreeRDP/FreeRDP/4146) * add support for "password is pin" * clipboard is now enabled per default (use -clipboard to disable) Fixed github issues (excerpt): * #gh/FreeRDP/FreeRDP/4281: Added option to prefer IPv6 over IPv4 * #gh/FreeRDP/FreeRDP/3890: Point to OpenSSL doc for private CA * #gh/FreeRDP/FreeRDP/3378: support 31 static channels as described in the spec * #gh/FreeRDP/FreeRDP/4253: Rfx decode tile width. * #gh/FreeRDP/FreeRDP/3267: fix parsing of drivestoredirect * #gh/FreeRDP/FreeRDP/4257: Proper error checks for /kbd argument * #gh/FreeRDP/FreeRDP/4249: Corruption due to recursive parser * #gh/FreeRDP/FreeRDP/4111: 15bpp color handling for brush. * #gh/FreeRDP/FreeRDP/3509: Added Ctrl+Alt+Enter description * #gh/FreeRDP/FreeRDP/3211: Return freerdp error from main. * #gh/FreeRDP/FreeRDP/3513: add better description for drive redirection * #gh/FreeRDP/FreeRDP/4199: ConvertFindDataAToW string length * #gh/FreeRDP/FreeRDP/4135: client/x11: fix colors on big endian * #gh/FreeRDP/FreeRDP/4089: fix h264 context leak when DeleteSurface * #gh/FreeRDP/FreeRDP/4117: possible segfault * #gh/FreeRDP/FreeRDP/4091: fix a regression with remote program- Remove extraneous Obsoletes for packages that never existed in openSUSE:Factory or X11:RemoteDesktop. - Rename libuwac0-devel to uwac0-devel and libwinpr-devel to winpr-devel, as that seems to be their upstream name which packages are encouraged to stick to. - Remove duplicated pkgconfig requires (these are autodetected).- Fixed download location- Switched to official RC0 - Create wayland client package and libuwac0 package - Create separate libwinpr2 to be used in other packages - enabled gstreamer (currently disabled for tumbleweed) - enabled kerberos authentication - Update to official RC0 Fix the following issues identified by the CISCO TALOS project: * TALOS-2017-0336 CVE-2017-2834 boo#1050714 * TALOS-2017-0337 CVE-2017-2835 boo#1050712 * TALOS-2017-0338 CVE-2017-2836 boo#1050699 * TALOS-2017-0339 CVE-2017-2837 boo#1050704 * TALOS-2017-0340 CVE-2017-2838 boo#1050708 * TALOS-2017-0341 CVE-2017-2839 boo#1050711- Redo history by using changelog url - Update to version 2.0.0~git.1497095982.1dbd2d28d: See https://github.com/freerdp/freeRDP/compare/043243f...1dbd2d28d for full details. - Packaging : + Move to xz tarball in _service + Remove 3472.patch merged upstream - Update to version 2.0.0~git.1496304402.c42ccb508: See https://github.com/freerdp/freeRDP/compare/043243f...c42ccb508 for changes.- Forcefully enable PIE in CFLAGS as the automatism did not work.- Add 3472.patch until upstream #3472 isssue is fixed and PR merged this fix boo#1004108- Update to version 2.0.0~git.1477034991.043243f: * fixed kerberos authentication * shadow/rdpsnd: Fix race condition in rdpsnd channel server. The output buffer and format parameters are not protected. * wfreerdp: fix invalid VerifyCertificate callback * rdpsnd/server: decrease audio latency and make it configurable. * Add an environment variables section to the man * protocol violation: rdp_read_extended_info_packet * Added support for OpenH264 1.6 * freerdp: fix sending of TLS alert on NLA failure, add better handling of server-side NLA in shadow server * freerdp: add configurable NTLM SAM file option for server-side NLA * freerdp: make modifications to NLA server-side fixes according to PR comments * Fixed a windows 8.1 issue.- Kill off __DATE__ from built sources.- Update to GNOME 3.20.2 FATE#318572 - Add obs git integration. - Update to version 2.0.0git.1463131968.4e66df7: + Fixed memory leaks. + wfreerdp: fix name build without client interface + libfreerdp-codec: fix xcrush decompression, revert remote control fix + KB3153731: May 2016 DST update for Azerbaijan, Chile, Haiti and Morocco + libfreerdp-codec: make proper xcrush context reset fix- Update to version 2.0.0, git master branch id a7ca42e (FATE#319661), no upstream changelog available. * Warning: This is a git snapshot regarded as technical preview by upstream. * Warning: For xfreerdp, new /long-option commandline interfaces have replaced the old --long-option interfaces. Existing user scripts need to migrate to the new interfaces to avoid breakages. For more details, see: https://github.com/FreeRDP/FreeRDP/wiki/CommandLineInterface * Add Network Level Ahthentication support. * Add Windows Portable Runtime. For more details, see: http://www.freerdp.com/2012/05/24/winpr-windows-portable-runtime * Obsolete libfreerdp-1_0-plugins. - Drop FindALSA.cmake: deprecated - Drop freerdp_branch-1.0.x_fix-kpdivide-issue831.patch: fixed upstream, implemention now in include/freerdp/scancode.h. - Drop freerdp-CVE-2014-0250.patch (bnc#880317): fixed upstream 532c420. - Drop freerdp-CVE-2014-0791.patch (bnc#857491): fixed upstream f1d6afc. - Drop freerdp-fix-FindPCSC-macro.patch: fixed upstream 9148af3. - Drop freerdp-handle-null-device-name.patch (bnc#785437): deprecated, related implementation dropped. was: freerdp-fix-pulse-no-device-name.patchibs-power9-11 16958933452.4.0-150400.3.20.12.4.0-150400.3.20.1freerdp-shadow-cliwinpr-hashwinpr-makecertfreerdp-shadow-cli.1.gzwinpr-hash.1.gzwinpr-makecert.1.gz/usr/bin//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:30864/SUSE_SLE-15-SP4_Update/68b85ce8df772b65b5a8d1fee1cfea0a-freerdp.SUSE_SLE-15-SP4_Updatecpioxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=8aed660d8bc18c6161f158985ac4f6db3b28eb5c, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=360733c583a4409afb5160698dc916747037d20e, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=9486028e2ebf0a34fc092b396e6156ec8bb14019, for GNU/Linux 3.10.0, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRRRRRRRRRlxxq%= [%utf-8c69acff837212b02aa2cf1b49e38e7119c47c65b180f2c7af94f97c06e99149a? 7zXZ !t/)&S] crv9w窑YӘ]f ?]8/B՗;H%VN./(G4p2DuL!jʜ|R1&~,[o}юjᣐ.3(GEo$!(ulSZU<"Buf7B5(KbVPވ?v7:,lS}1 #-U)V GZk:DHrˮ-N#[͘fLjm}L6~xͳ:IT@=0dRMià3@tk|.hS)#687NH"ȋ+-RD}G`hs8)@'-CV\yE5OVb9tUZ:)^a^b >PۖݨFLe:E ='eʝ/QcJsg%$.ix{d n@xY^σ7d,k ЃWN_\ 9x ӡiiZU.z:BV 8Y u"?|',px~V!fDŽ$t%+gLjs4 [CЌD_[Tt? @`qMȗdd 4 vn"XJbb.5y^%kEŢ4[:H5P6yd2,Ի^ rVOqokm=x[& .8\!+ղ [m JГ揨Ih_Ό0+[orp3|;8Cfןfr.3hr+3$ݧ8fBi]o # |]<8 5o=Ŧ9 `yj" MS2^_n?GټU@t(8';G=6z)-I2D8d]0 Β|u;q@NmЫeOb'y2S-P͢QO].,oYR"eר^yވ!@hF pfOq Ej;)I ԚQaJ/ &JE)s|#cz`n!pLofPAk{U8(=FK~l=fXi1~kOLN4Es( 9;s<*;jHgH>g\.f82}hwTfx5Nן3ophf[+ \^IKYyGte`ig1Aa|4!hh4mﺔLoե@')')<T"߭)269Q,qA n F3~{KbSǂ Л~,+m=a uOmz9TcړBx:+ rSnY H $L6 (L{ZњC/OsDb{MWe-@r#F,c@^߬DͺT[il=׻.cLϖ0ezC{pX.o;=Ϝ0V6&$>nĂ&ѧ0bS&מDφ*KI^F&Hf:܈͟x3>x.ho[nPPn̟$b;;Cf @AAĶ?H{^C`DI SI߁ClOTm_۾uqAuI?rf{[Ul‹yi#_Hֈak Ny|#HV|[@wA}dC׎2lZ4뒬YHիWD!-A%sH/]3t\Mq6,/Fc4_{C>~n u5!Wz@Z"Bj%2^QLTm(/Ԡ79yvaUrSIe{;L/٬ L~cu"P+Ma @r@=ͭ}C P!}D8WOLp*w!՛ῡ#GXIwsm&k݄ Mh_]CX t!ZZ[ON-i[YWH\lg=&' eZ\βEk x- qLYQzcZ\. ƿ?r+]@o~Invվu˟ ꑬijdȩP~|c\IJB:=!<b:9fhJR|nZ_P5Ï5OA;:B|$u.`#KܰR:޹q ފ N$MUT$`8ߟFn*ĜD~˳Ee2emnXAT^!)jEwT``qV;y{"f@7A[F']jMNMDHB'@ef0!$f1:If`Aƫ8P[N0Pnwl%7 .d"vw qntM9X%Y(jv`T Ky.,sCu68׷&wrnH5*&ʻvǐ!¦t#Qt%mE'WBI顥eFs~& Li0CR^aN /C{6gU闦r/Ht4u݅2.6W?.N۞O2/qI5?dԨ^|2˝4~m"S_C tB)QU\ocXI3%:\^iI)`W-c;_moOўVhj|+02p Q@M"LqU$Y/eRqYE3I5NIzsC-+^~HJ(7V9bB7P.ްNٲ۝,Kq{7suz[smTL\kU+Jfj<:L=mTs4ڋnwA`uTqZRgC9ϲJ(hbyA aݬ)Z~㺤Ɍ auNZgMW![8t[ٗN'@ #k7pi|-0U爃撌j7aw2?[ݠ1 Cv8"N[g!0L#|Z3 Nj̻UE1~PO5mm>,) l篢Q:L8b7kN~b=lshӒtFt{t2yTx`/U؟e3$,1+"]- OJcpMa?!)QmZ=]0T5qeD )wo]DZ|yUr(@j L@74}mh;3Gv |lcr[ioqZEql 45x[wg(-}!vyZ:o(KE=: R]cy' ZW,x6v W{#Tg] e!F\@8AEuܜ.JGc#78*}cVVbumpmfӋ)gQ0@s5%T̨OkPf.ȾiSg8>d7nLqK` 9^(lsV6w͛r g.VobK]vSY׋ BNIc Ltxv&LlҊUw8UTshջ)gysfMa>I_Ӷc ش cCD)M<665ޠg$u'z hP yJ"@67e1O(_U*pYZF3+JbVve]byɗӪ0=vϺVhlQ- $丌iE*&eZc9zf\f# ]Ȧ~}g<V= 2%|]G~ ܖuW o|MKor6c}*Z p'SU'{W)V/Fhd,c{3LYEٺ\'T}1m@WnGݓdcX ~#FW6s)rFZr_$9|<|'{ wfW%No^da '&Vձ8-0riW ̵6G8i>#,!/(±-C $=%賓G%rOr8$~ͭ&^jFI|uJfn+L$юuXn:)آ\2Gԧ#?&r0_v(qBwaK9^\s}Z򵇜W_3#a4V4(pe{{ 7Dho8#[c3hLsOѲI@7 \ ^KwkO#0IM{/d,WJu>~ziuO uxىoSW&Ѿv!vVř&bh"hB̡zN˜^) ^pjk0OFaiNA#Wɢ[[vSĵZ|K-hiV dz]l( z5Hh%pp𠣗X0 #$C}h#gL<Dx'zz`CgFJP}&q^ݏGH<]D0 C]/-:w: <l9Dkh@V[Ws6E53%T%5{b=C!.VnӾ$p 693kk2Xx=$s8kwy֜3݇j8SS8c월LV5T0yNР"; s]8\||W*8YP,d!LHk3D"k@ %y?Xw؝wh@rvsm@o$ t:P =cNw~W!$q&,1}҆vk:PUiiHw$Vc У2GWw;v(Y*;!T84 }_+nMf֝)";7߭"q 5^۳0~1_i2NQPvt t',hD|0&<,t$ m41vLBoi8sO f{=s*bFFQsi q.‿L> $};mNm rINr抆k'%jyW:"(>ꗒYV7o=7IIM@LT:FAD9@a55Z=~"ʳla6~{­hSx !ܗz?Ai xDh?  z~1d˯C q Zqlda<q3Qx 'k<#q PX c3q}f 0\mnFs?ZC~kN܏qt `g)9hxSp#( %ĕĆʡbdԕn+Cy7Gs?i!@EqMo:n+_XƞsI_VmLB uF(]9W<(?AԥGig1Zh_gH EnE2f!;+oכ꜓Hb/4s]n۱G!aC84-OWi5-%dd3B[=p;"]0]Ԋ3fwò9m[iG/PWcDص2t'[!vݐq~Q_4m^tMZپ5nh-/Xa._$oȗUrݾǀ|iF? N7 xc%Xj3Hľn9z/Vg#loD۴{vO[(bKBpPs0,$Bzmma S6Xd8ڬ-+%SiliY^3K}Ɠ_ ^/\)&;QHp#6>onswe^Mnd[zJ&22tn:Mm]ǖ]Y|T `gQ닔y3?aamV0ީĖPsni%MkryP*jK8Q(O\׉?w4 v|/u5~Kù5{\T|JL6`@o#F${:#4pӁ F+] KLJ%,7jt*M櫯8Q1wao%CFꭦjoed5<`a,Z\OZ_B p[P½j9ݣn(ʲԅv'ʽYS8n2,Ha64QTYg瘋u6~te%GUMv38"ȓ> Fpnb_Tcݵ?&rTSwj;ޫ`t _ 7A `W˫Gw<$W[5}{-F\ӓսP*[,#XW~6H ;hPNP_\ V!`"}Y'*rdT;_0#k2r/UJBvf 'r߰j?fѻhnvx+ M{g0ץtz k%бAkv[Oӳ~o!568jw5B br& C>W͠ҷ>m("YU\m\E(]٘ݫP=*0~=wؘ.8Y/WD:5uz< 0]Ë &͊:1E/]%n4f`M h+ YZ