libut1-2.11.0-bp155.4.3.1 4>$  Ape-I%z 2-܂oֳrPSJ>oa&5XS ]SϮUpVcabưp=1e}`\M劣eZ%7Eؿ)چv̅/rZ3`a1~7u2~2|U$AnH4xĝ`~raҲm~{ eE`䚷lq;vOۊ-` \ eBA 9uY%UЫS:N6il<n%'] ՌZŁLd !,U1CrڣaoA2xԳՉ˚3A_f֟ Lt^]UC7.^H؉e-I%z TEKgq&VwψqUdbvnq~s%ݏJE݉_lߴ}ЎxǭwƜv1HWÆzxOX^6%^|^vIX|C5'\~ʶ/-5.B~ G+%< 7v.Ie E.bhoH0U˃/:+P:w|R[]j@J(YݡRavyT^$^Fnjݐ0EElїngv!T `v/區GxЖ44]uy*z>`}Cp3g^w^Dw3t]w$pI`=2EK(p%kП~~M2 4eF&K̃_5\Kl,:X>p@(?(d   U  1JPXh p x     0DX|   ( 8(9t:T>$@$F$G$H%I%X%Y%,\%h]%x^%b%c&d'Ce'Hf'Kl'Mu'`v'pw(x((y(8z(L(\(`(f(Clibut12.11.0bp155.4.3.1Library for assisting in URI construction from templatesThis package provides the shared library libut from opendkim which assists in URI construction from templates.e-)s390zl247sSUSE Linux Enterprise 15openSUSEBSD-3-Clausehttp://bugs.opensuse.orgSystem/Librarieshttp://www.opendkim.org/linuxs390x7XAe- e-e-e-41169669b5fc3781558a3426f327fdb358e5c0b772efe6a4188e1862ac41fcb12151f35003280099426f3bfb6447a87000d16ed487e743314983175f554d3fd4libut.so.1.0.0rootrootrootrootrootrootrootrootopendkim-2.11.0-bp155.4.3.1.src.rpmconfig(libut1)libut.so.1()(64bit)libut1libut1(s390-64)@@@@    /sbin/ldconfig/sbin/ldconfigconfig(libut1)libc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.4)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)2.11.0-bp155.4.3.13.0.4-14.6.0-14.0-15.2-14.14.3e)1@amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Ferdinand Thiessen Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Add fix-RSA_sign-call.patch * Fix bsc#1216117 * Fix call of RSA sign on big endian systems, patch origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial package/sbin/ldconfig/sbin/ldconfigs390zl24 16974500252.11.0-bp155.4.3.12.11.0-bp155.4.3.12.11.0-bp155.4.3.1opendkim-2.11.0.confopendkim-2.11.0libut.so.1libut.so.1.0.0/etc/ld.so.conf.d//usr/lib64//usr/lib64/opendkim-2.11.0/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:18120/openSUSE_Backports_SLE-15-SP5_Update/4f7a3a914e2c3e73a7bee50026d42f5a-opendkim.openSUSE_Backports_SLE-15-SP5_Updatecpioxz5s390x-suse-linuxASCII textdirectoryELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=2dd7c26a22702ba2a756b2ea1e10d7f22060cff9, strippedPRRRR({$2m+/utf-87c984bd4ec3d170325aeed87deaa111126189b7acb5b5cbb81be04c57e14c7a2?7zXZ !t/:W] crv(vX0qh%Q \N.FX0okNï7$W@ ͸pZ~鋬ǂi2zҊAXhЇx`@Z|goRC8!ntʞ7D\STJ8?Dy26 ;3H̝ԍs[\Sc(/= t2 R^S6@/+.OK2y*f;`B sN5l@HW/q91K8OՁ@ZT^hM2e$r D Z*td(@DŽhU'CQIBy"S~90`/[+bzNCH[#b{F=ɯJu#*:6`>YM7_Fvz!Pl@y??YVY3dm#s{OCŒ͋uyO;wvTV&RJGGäS@n nQ  rmU#;6I97-[ jR 5HOz#lKV`JRn.Amdsup4ؿ54QӞKc(/ ; ·j1)b+ ΀ >):kt"[tqؒ3E _Fjp/n>Od eń+/AŸaaS`1̄խ!g/ڿzɽ'1j*¦*7!Ғu΀ ׁWk͗͠,>#],+K\)S=ca~+_[s~aE-Ԥ7"$RD${il~P3K:7*I?;#ٯY -,F4;G{~HkT!ӼDLF^fB+<ĻI޲G;ׯ.=HU0+w?1}>P+elR'm/ {v$U.2G:\ě~>Y(*|6s1#%8k>}]s,!1ٔ t EDFx1.ؓXC#N>eϵP* .ԫAVԧHW͘)NjqCl Kyjv߿}CQ6386YfJ?&[Zu|RQWC)tމ (9/֭*64 Z\7=UJW#oW˔M'>qg{jE_+At3t"-V9W.<neh*qemyff_Q,Ln̟PdW^kyي6Fze]0TWIM-6,qTptƍ~Hqܙiu$1-?֗ kR-y.hV%-&q0)>< 5CcAPPs @O)4[ʢ1H{GE=/؅*g\E+y1ٿ.V{y}6F>D +WnU? BQI~#VP -d~YGү:C[>XF -jiUOzș !$ԠX9 뉢}< ;S*{9;&Ok_}ꪪc6XyIф c 8{ 9|Ə\' (nD~LWJeў@O[ *eS&A; !jK&`W,]a7< gMwYK3y r> k=Y]v3ݥUa28Cە'CыϦT,ʅozUV5c.nʇL,2h Z/Fԍ#{O1^46FRX;21gw|L6f4+ ˓SZU{h*tfM B/&qb,dEi!;\ݲo-CYuE N}C:IKj!%<AmYwV5~7he.:՝ 8xTyb./k hwq^j0G%de}"qOc H뭌,dɘ|?&E2@ Q7Ki.zTZe?y>b?Z&j9`O1fȈ}ϣN[ZP8I97$#G3PwI<fo)oJy{h.IJ[r|T<Ibh}uRi?0?tc@5Jh*%1&[Đ.E =bqELؤ+=]@i m]@9n?䵇.K-,x'[67XTL+ODQ1CsDBc`bҟ$%]||>Mdםqq|80jf;>KpW@>]SVC3"Fk؂F[xHHrqTQQ1O/.H ZFnt/T#spz@P7zX~i"_ ˾uί~W4 vV<{TIN`[ں-Ax|ot^,,Nws+XxSTsם f4 q,xϺZQgA>9>@jN.Qw-RoɱuCi 0K/fDJ?3L)SE͐N)mf lO9~8C+|i?"."GhHL| MUw wis.ޱTvqwm,&Kl]wxm\|T|k[R)Mo]{iЈ)=-J1,L#b+ ߙ<}_X[+j-vն5JD w'?tħ-uVl!V-4aPj/;EpP>KԄͧO @@ꟑTW(uL\'n}挬psOJ#2›>٭cpN Y`sD*B'Ĥࠬ;a 5/f!>3= #L[t_K,)@ @zU# yԋ5AnXbl#LVX W. `v@ z@B!7#U>KJ i2.xtE\P [[zlV$8QKw!MGBwTP9"1Q(Xdˢ!a ⋽{c$O'g#||[:K-B$DPI h{$_FTRoE\MA2:M<ɲEur0NbK^)nV(~TS2oO' /_|2fؼ fR H2pus}H1?fk ioK= "8ɆA8erSlSȹâAy㋊K%-#2 ZZ Gם*kcl~X=c0}@({=x7ʴR4tv!LpGg=gRv#5"xCtժ֑E-]kW\{ƹPqTʝwwghqTu_9(Uuܨ*8ٱpր/Ze;),1 )βgR*IE`^@ĕ2W';jDD{=U8ݻZXٳ`4܄s_*W\Tׇƨ]C޼5 E/3tp,{CӓG#tZ YZ