libvbr2-2.11.0-bp155.4.3.1 4>$  Ape-I%z fL.g%w4ȅ [>Ҍ)Y}﫜[hd r:Y6ʹwo&>OˤX/X&moNR2W/~ڀH5 ;8oe.c3]j1%_ :|%pnt`m|-d^yySUcVL!5r 7x{^3iě *s7VU#RGyZ&ݬʣdekA'BزK^NFW^T )c3 @J@`qIJky2ddwUNI6>Lms* ĎՇ1 ;h_z٭E^BP cƼ:=g~XVL>ѵT#=xI/cNojЙ&|*1"/9aILTSC/]$3^,` <өspbX;0 [23a3ddd22dfe0f963b6ffa6b960aff672c141915c3125950f5e7250e5946444ac6eac88b6c7c86e2a2baedabd6ff6b45e00a8143C e-I%z @#嘰k05<1Mj htYier)9Xr?$EW˜dN;uCWY=S{Qz/3`4wALsރ5r5m,+FQ=]G e3焨f/Ш!&3]l!H(I ީ=\Pȯ^G0D*iVWr_ %iNۮ; mJ΅G|T٩o0N.8vxV2_\q{_4HJ vZ-I`r#UG(>aPt DfNه! ]ɠursV*,(9(](E!u uiO5(g͗*Vm )+})(]w ɽ՜=UI|Cc^2Žwx-#O-_KKCr&}-'C= Cԫ^ )4ir\kWzq21f,8=2K!.,40 &Oܗ%C> >p@'?'d   Q *CIT\ ` d l  8 h  (89:>$e@$tF$G$H$I$X$Y$\$]$^%b%c%d&ee&jf&ml&ou&v&w' x'(y'0z'L'\'`'f'Clibvbr22.11.0bp155.4.3.1Library for assisting in Vouch By Refence functionsThis package provides the shared library libvbr which assists in Vouch By Refence functions.e-i02-armsrv3`SUSE Linux Enterprise 15openSUSEBSD-3-Clause AND Sendmailhttp://bugs.opensuse.orgSystem/Librarieshttp://www.opendkim.org/linuxaarch64`e-e-7dc25bd9716a412b6dd8f7be78f5baa1b11746a337362c247080857952e19952libvbr.so.2.0.0rootrootrootrootopendkim-2.11.0-bp155.4.3.1.src.rpmlibvbr.so.2()(64bit)libvbr2libvbr2(aarch-64)@@@@@@    /sbin/ldconfig/sbin/ldconfigld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.17)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3e)1@amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Ferdinand Thiessen Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Add fix-RSA_sign-call.patch * Fix bsc#1216117 * Fix call of RSA sign on big endian systems, patch origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial package/sbin/ldconfig/sbin/ldconfigi02-armsrv3 16974493502.11.0-bp155.4.3.12.11.0-bp155.4.3.1libvbr.so.2libvbr.so.2.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:18120/openSUSE_Backports_SLE-15-SP5_Update/4f7a3a914e2c3e73a7bee50026d42f5a-opendkim.openSUSE_Backports_SLE-15-SP5_Updatecpioxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=13f5d31068de2b3bf159bba4875e8e58e87d286a, strippedPRRRRRR>Z%ev%%utf-85c452ae8c3ad3469b0bb578dd221349871abcf6bc1a4539b059d46e7813822eb?7zXZ !t/] cr$x#I|S_gQ?MOU]u%4u91xtBs8*lVS6-Rnt't@ Hf(-YCF" z__XMfoXPW&Sw=q4(~Xj[dh~1_?#XG/3nR_NT<=1 ͦ ͈{W9]Vz} Gʏaֱh0qC5i v> Oު`oLID=OwPy6HgSfvϟ;t'R~oiz=6t~: %cu1Eë%)wH&;U$#}枊%u:yt]O-L JvtD%qg(+xsGpӬk¼F7quyAIO|)(e|){wy>ԥȨݚ%}ݠtFbm@ݥz. sSy}轗 |A-ʢcMC=ɲ9c>,45h '&PfȒYPʩ vDYA0q8J ^ 8 w_լB~]7<`pD)ގvX&)b-wI\R4_{&-a .b cPGuf\={t%FY4EcY.PѠ>u29e0Y1?tU{bW` ) ۖ}` 9|ҳ)5x? >YKNh6Hֆe4Kr@̀%63luhRޏՋ :EL>{J[dƯe;""&Y2F~X"r4j'*a;lH~ʎӷJL Z֎zC}>Fq1׶NmwZj :03A?L,6N&bv;Ԣh="E\lp'R:Za20[ (|$ @N;D뀡5W߹\4jO^%+rAX;+:L5 5w^ʷ ۋmE?$z&29h]Dom <~-*IM =I1c?k?8 =T;5}$bjE>B>WZP RWg').=da p2h|1Fgǵ PցFI: qݬvczЧd UpKJznת "(] Q?kMC,tW# v:YrCMm-vo(mnbkJKqu_4y>dOb<"**"`1#I_$ lS{kֽ82 cHRQQyA ̟93vФ9Lu?T\dV0(IƖAolHJ?4 JUr+B#½!:ޓ~6!bTABVBLE6\,AS`ּ<u:SNF6So7Fۛڒs}ڊyV-ry B trMcyGvb§ûcE]a~9uKG{ZΉcx"u5|4Z 6\\r:džV 䒀mE9W&qqa&+=c+9TqQ_OmX1GhdIi͓:qT1+K@%&5s|^1 e̓3ha) A$cH+>wG݉qSD\<4H`K+,s _g3mj6??c kTz :fcCt ']j4Y& םk/pYlDG-@G1NGԟ"AUaUaaxIjHiɂ/*'X@b~w(qlքt7~<&ೄ%#UwzbJpeG\pu׆p~=n+9!.63}[҅' ǬxR6]þ~"`ēS!?֧GLnOɫ$aeיYpQ9y+1lN8COB?w_{}Q M }k1=/(Ym2W~aG.<^J=D9 dtbT7&e_`Rzk0 5hp! RƠ ![pAG řztƤLNrr5ҌNU cc};s1^{:PԫUmV TKM&!(ANk9K)Bt4Z 77+Q>l8\@8a6Dy\C+҈`Ȃ/u!OFOŊ)bqVՎ/pp!y|=ƿ,q xJ.q{wh >f9.j ] $= ͧ\0tx'֤B7ĸKh\܏m=J|9m‰/%EP_f]neZ xu筂 TokgYuvLb?dWqMݚYhsqi:@hs;azH>Id4WC*h,=́1=.d?='-y{yIxhy)9}>M7|@^=݊y" лB3 F ]d+o lѹ=QHl{sHhNs{^l.|"_ UH늮g_ 8,d"YyIv4fT?- wxpJEJgYh wס/ǹ`frv3ƿ c2RrI,BЯ M!e` x.>o}5ei]m;8ZYAQF[:JAKb4= \xRyx։ǬBmFI^'KW7$9u5Kuxx +r_99? { pN9@`9ÖK#O$sqB2^ C,6"8Mx2m-,c+ksEH;NJq@PW}1PO:а'S{kuI:P ef{[:H>B~|Ikb)V'MQtޮ&`FlV>RXpw Q&%2:9#*Rrntfe}.-nv3 aP ^a-y%`f~dR!FAkg\'悂/09ʳ:S+UN$.ua3![B[p(s*u NvQ'>WY|`: wR#뇎:R( of$8z*&~: $Βd&3zo޹1Tl銿Z1%D$X0aLk+1qeO_{uC揎> Su5v cє3|?ȅI!& 羋cv2''KJnDZ2DQcZZ{hW}cOo@5FŰoQ+.`STȍH"ńgQfq.m˺],cUTU[48(n'*iVђMZz!ur&^hѦU)'kw%7#@{UbC"(+W.* YZ