librepute1-2.11.0-bp155.4.3.1 4>$  Ape-I%z 5t80<'kʃ /dP%em')qM.ʏʢz|#_V=f^]lې?A%_7>w6_l]BKK.y[ҋe2RWr϶Yg)[04%H%l U EBEt`R<5qkZm WL K(|xǦ&\; " B*. ,g]JG"ʜ.²y$aگ +uf. q4L͂7iAaȑ&Tߺ17.(;e2%%Xf}07/"'Y4b6aa670f822bfc15d341a7692ab87cd256b6d985b2e0d0ea590c868d912b37e96e0949e62c4163608e1979b4eb0ac44cf1d65deAe-I%z ~H2̴s7E',0Ti6%U X3Y}4a$ ,WU_~ =l@n6JєeQSSfНڍZ/??yR ˏJ#.`}Zїwܟ>ĔgOS:!!ɂ=P= zi)b9+Z7r{"oaf@p@(?(d   Y  1JPX` d h p  H(89T:4>$@$F$G$H$I$X$Y$\%$]%,^%Nb%Zc&d&e&f&l&u&v&w'tx'|y' z''''(Clibrepute12.11.0bp155.4.3.1Library for performing REPUTE queries for spammy domainsThis package provides the shared library librepute which performs REPUTE queries for spammy domains.e-obs-power8-05SUSE Linux Enterprise 15openSUSEBSD-3-Clausehttp://bugs.opensuse.orgSystem/Librarieshttp://www.opendkim.org/linuxppc64leȡe-e-41070fbf3d23f1e9b166c943981b878ab03879c554292b6b382225d4880be92blibrepute.so.1.0.0rootrootrootrootopendkim-2.11.0-bp155.4.3.1.src.rpmlibrepute.so.1()(64bit)librepute1librepute1(ppc-64)@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libcurl.so.4()(64bit)libjansson.so.4()(64bit)libjansson.so.4(libjansson.so.4)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)libut.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3e)1@amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Ferdinand Thiessen Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Add fix-RSA_sign-call.patch * Fix bsc#1216117 * Fix call of RSA sign on big endian systems, patch origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial package/sbin/ldconfig/sbin/ldconfigobs-power8-05 16974494342.11.0-bp155.4.3.12.11.0-bp155.4.3.1librepute.so.1librepute.so.1.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:18120/openSUSE_Backports_SLE-15-SP5_Update/4f7a3a914e2c3e73a7bee50026d42f5a-opendkim.openSUSE_Backports_SLE-15-SP5_Updatecpioxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=01029fef36c1feefd3dfe68f43f0f8aefefc13d2, stripped PRRRRRR RRF;#*KXhutf-868181b1e06d2f27df8ca26d6b61120fd6a35342cfcf8d23eb009ee298c320809?7zXZ !t/ s ] cr$x#I|STU%~BM:`e %/"'vr5g2D.$eleʝ@Md(>PtI?3DG7sт[ZԥV \>٤Ӫ" zH\Dԣ:/,N8΍Vaő[Y-}.x/j /}Q"m;8vǢeʐpvN73_˹q{Vz& 嵵BViA6i_tlU?Uz鴏_-)<]M t 3PX휶gezPFH)Hcx6gz~^ 5%FHw>9l`xzQtl`'%`hsYRm묢j@j`eRoSȤ`|.ﶧD RzU6:a9})~ iAU'-&QHo hi+D]2^M/m3b*EcrUuHQ&ޤN@(Ye> m}2Wr.-$ WE 9oZ_e1e 1~.'_$n'^([?@\e9Ekm=i؍ e O;l ,Pg"Ds+`D@JTq_22BoR%G}/@۞+_l*މּݗ\iE8,;xgw>f,b")07"QrLRm&odtM}4 vS8 08d/viԲZzp Z6jm5&FNSM'`6Û%B\HY 70j6N􅟧%m K讔wɗ ն!5UkAEj /Bd>Nc:4 )P njZ3e:%GD(-K쎛>Q0ql#쿒Nu]>zĠ⡑snY.7Y^#6)\ _ sFaFRﲥ s`: vB,s Aup =sa،AmiZeV3uРlz\_J_~fcq ն( _>q~QSdҘi d2Ɯ $ rON97`[i;X%. SW},DgpAM y*; ͹*~m,sKi'쥩<"1NX-77\W~܀w-=2@߉*}Ĵ#YFM/\27 eϘ5aS (O/) 4Xnl}()^ݧW2TR_./֫)|2=Ǡ1w<5B7c;*vUK#+7RZ&MHH^RMk$iPDH lV ?AW+9!^R G'c2?]s9%JQͼ4L{LD.!Oe2}ʚ;0rJ*S/|;ge惛Qo9q'BNLc&)?4>hg\D'N_##9܏m|+CY4mkMSv lm _;>&7Xa w|~рH2tWT59kZ]s-2rzs"I > @-` ~I%/&i'.%za jnQ[1* @KVtCPS#]) 9RNino1 S{g6 ; F'-ݜ#~z_3˿M?/IwP)^= =){ҽw:zY@j)F&j&juT>0W^WYmf:G;ItɤNC$RYR@UyT@(C6Y.O4Ih~ VG'VZiVKj)p#/H,W ;k6KhǂA _B]% / EZQ}$X)̄(4b wO>z_qk!G1PS{f }Ʋ[$ ˓| -aVi6`͘@eaf[[Ybو:QHU<8D tu@zBsdOq0z f"i@0!h8Ȯ[Q}B-孭dNW<3 B1?ŚLh&+ |SwA4{N'WtPK2,/!G%W9u&XAH{;8>I1dsZ`!̓J3ŜvH-孷DSR8CU!c"ZbYh:. S)>n5{grd!׸Y "xK9VRlV,OfpT5^`z[;ԖQu2ldtϩUE6Z}]S1n4_Uҙ@%}Ү0cDJGOb %ޚpk*`xYGx߮u47nP|~rZI>}6Ef G|c 37L盁0^ğWF5˻,hv >H ~-H䙩Ho[ A6!Gdo۪<%()az~I$&lKlDw8#!Ϥ4SWX&4Int,z m/#NK;~W *I!G"?wI.3SpYjx+̼&ף,ۈY+5{bP@ m1UP?_0>m31Op$.z2?o (_bߔq t({0٦t~t!d]mlojW=C;b0ffl|dO]^)@ ֌VdOT0gğ衩LFf˾n€HYfd!)mooʳ捚 b*)$2PJ#z=O$ciw㱽c| X,1ѢƻSŠI?< цu3dD[ޱd p (3w$TýH!, 7}'Ԣ|uLJ[5Gp|\B)$hѓRL 2qm{Sͷ̵h#])+_'e\Ju*C?O˲7Xo0 ȶ|t猪zqD:g6_X%MVAsJlxڔ}:N_plnU;zbgT,<0hĒ>$6Yu&MrCƿŕ :Tv+jI-4MFXEx-iGܖ%Q:ȦTfW~"LAWU !δBhRWJsrnXEИ>eiJq9a!t4N+X܂^hbkq2Z5.fe6s3anhՏV'D$-6aUF8k@KG@ uCpHA^& "B͹/6D=`+]\5vu^*O配"`ɻ@+)~(jP"IG.GޣDIS6`~q}1RlHG< 1o 0TS%>6~\c9.S}iyP!Ki9r%\{,a-KmWyFPcQcW #~' 7u8s:u`5`>W*1f&(^ru9'բ̢ )$ܙg+vY^phk7rvw1>47H|.٣h9'B.;Qh:.ϲyX#عO 2BFqbZpayRa~jeqP((vc 0\kBR$@6k\$ ^F?A6C8.@&Ų=271m=k-J$xiSv d +0FGL3ͨO PBHp !j DKI kJcAyO k{(rHqT̢B6s0H 2#Ek%h hsCbZ#1~H6e;&/Ls2ݝ{Zɗ~r5r> %SA4?!hQ#?CCU"=@mW,+-iX5GX3d, 3ծDN#IZA㾕">x//+8=5L-sYkJh>EC?FfGDGԦ!*pi g1mCn-XE+he׷OGE:=QtR|瑵'Vտ➘E9K~i%!=WPo[pl3Q%?L3eb-U~x;_l@dr8R-(ٟߍQM&|>sm1(%#:-hhˮk=)[^^S@@ڇ^IW1Bl`vv!&FSQU ~, }[%ĨY@=}U u Igyb +]~謓~u̫K"$ߐ_ވs27[sh\k8 *3ʶ YZ