libopendkim11-2.11.0-bp155.4.3.1<>,Ae-)I%z .E0{ ߑ7iNkW=XTQ}_%>(>Uw][;m-ޱS\k]^]x$(׏j Z;Maz 5aJ++ю`Fvv{eK:ipRpڝIufL1ٱ#$%ʤ{c!`=N9 TDi1)ԫƓܺW *!bn3Z6|E7R&Y1&[af$1 LPµF8l1瀝J&uUw"CC^Í?D@D`&㠺7zl?0@!`ǘTbJM3 z+̳'> k<"stV97hŘxЩUKp>Z L\_"A(׻AÛ,RәscsEnzstJpnFm:dP}I8TJ]Eql^@ c\&oY"¬bC{e~z6-Q:m/@>@(?(d # X  %6OU\d h l t  X(890:>%@%F%G%H%I%X%Y%\%]&^&,b&8c&d'e'f'l'u'v'w(@x(Hy(Pz(((((Clibopendkim112.11.0bp155.4.3.1Library for performing DKIM signing and verificationThis package provides the shared library libopendkim which performs DKIM signing and verification.e-)s390zl24HSUSE Linux Enterprise 15openSUSEBSD-3-Clause AND Sendmailhttp://bugs.opensuse.orgSystem/Librarieshttp://www.opendkim.org/linuxs390xHe-e-8cbcae43759b804c92f61748565c340ccb57ace5cd8f225638d2e3d0e8c57923libopendkim.so.11.0.0rootrootrootrootopendkim-2.11.0-bp155.4.3.1.src.rpmlibopendkim.so.11()(64bit)libopendkim11libopendkim11(s390-64)@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibbsd.so.0()(64bit)libbsd.so.0(LIBBSD_0.0)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libdb-4.8.so()(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.2)(64bit)libtre.so.5()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3e)1@amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Ferdinand Thiessen Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Add fix-RSA_sign-call.patch * Fix bsc#1216117 * Fix call of RSA sign on big endian systems, patch origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial package/sbin/ldconfig/sbin/ldconfigs390zl24 16974500252.11.0-bp155.4.3.12.11.0-bp155.4.3.1libopendkim.so.11libopendkim.so.11.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:18120/openSUSE_Backports_SLE-15-SP5_Update/4f7a3a914e2c3e73a7bee50026d42f5a-opendkim.openSUSE_Backports_SLE-15-SP5_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=21fafa5c1acdd951cc4e241d57c687ec212d3a25, strippedPRRRRRRR R R R R RRR({$2m+/utf-881765d86715d1091509c74bed74ffea662a07c566175771d422fe5ec369ec05f?7zXZ !t/*r]"k%AK4"u=TnXN1iO,-W ?'mѦ*A|"#'%ȇU__S>|QK>LxU`<1%5&H'kpj-;CCd# ܜJ#PnjuVN~1A31埙r>s&]uE-+o,CjZɣňds+MzuMUTh M'!} C=$J5<~Kw[ H,B ȶS]%zXkˇ,kJs jкm]ke;My 7W/W, nhD.BsnsTvT$P\.sAf3꫿d93dN2] 1nH@Z q+a֘ѮyfӤċx d10x@cـ xW?}UʍVb!ZDAV#zi4[5'heu3c?X8)mMW% q#?|u;jv; r*2$C"M0%@>yyԻk" ̵s1"* +&kaas$VB3k7UcF5=u~c1"=amsZhmP,}S-Og(dYqv:]@{.36Cy`z!C}endZJ jn:ٽ0PoBdHpсMV3ݡdbg R|J+uf 2P,Wm% Lr`#PS)lZ@=4N6{_F26ڨмgF"4bX(;!(oOe&6I;~ }m­63Jpӭ#DոmDLBvU\V9ǡVs<@*G7q Itl^>a]IUne;dNr$\TY*#@h[0}Az7{8:Hh}?SKqx-'}jUIȊwɤnLI}\]}*sT Ns*XxmJ6TEpT-/wβ)Hņ3p7aխ9A1x7 aj}6r/3j U1ps TİoCXL*#̤FÏA药 :1; r=L0/_ BQUN6F$^RDa/S4:ϟ&,frܱXW3cI-a?}h)1w;Z @ţԕ%RF$OW Mub".AІmvƓ,dJhi`(JD_*c v0/W{uh RoH=#}OݞIc]mSԬ@C-FVgLC(A]bd,K r(7x֘6>15Q|NPW!<ܯWF3vԚwĠ;.OAԦ9p49ainx}:toCYf(ǽNgk0a]2NE#}$Y݇GҟUKjQ|Js򄫃C:(U2wV(w3#3~bZ@r)=V-P`]up$J+"!GنĈh}y&~_B]o5~ aG]hM颩=+ٸA pqYK0zIm\[b̟g N/nͪ6TbO;:ޗ/ ֝1)?TGFgF<ȓfWJե/]?^|J/{1h0:;0OeӬF?9o) ϏMָ-d8 Ǯ009rrfD uM)|W<6_)X&&2b1p=e^G6׬ a+%Lѝw/ؾ,ꞹykP-)b 7vQgx֎G!;&1Өm&9>nۓ|6 m%/' ΓשqIxzX?+T>,Ǔt YLWWj &ZN\uw: $bZ0;ek`)=X^+A*[}*} gnSCā߮zۥ@a1#Uf;FI;k`‹(Ye; {]i-0SCzS˧*>Bb ?eJSFDKqʑò滯 4|PN5'? 5ϣN|Hɷ9P#:32-;gr|ch%F/E7aΉA`+(o)g_SxºBoHS0סR*ZaG裛8Ex8ߐA'o).z^#xz=Vk.Z;~"'2~tn:$n񱣫u|ၮ$6(J 1-jIV 2!y( R Ϝ%ED8>=eOn#z_DW]?$xͯZg xGiY<3Ɏa>x-T#N"ۮ(I:O`{9,xۘa& gv- 83ed`ܰ ĪF,&bvXVZw\+Y;$;sMHKU46 o,"K|;O_`ZP}$)Wr)r[AfYe|$\q7r;B5lR`}7Dԃܧ _> qwOol"{=Džn]JZ$&v!x:?l3q"ٮح%ǝZ o֢H qw2w_]~?JCݏ6Ae;S^p[k"qM)K QҷϲTeC{^OyVKŒ M(>- 4SV*d񿭵?FԸgh R},poztrMB 6SH~H/qTϊouvMۆ.>ÑŞΙ.Md9S6]E,\F~IPdžw,VTލ:E}׆"i9Ai>2DN}q, Xs-Jg1{#w>Mn4#\67*F6f`d>4l5p#ZhX {jcN4#pls}?(0Adw:T#'T" LʨQ[e *^llՙŚvBk]>XfI;>8$c'S"ĂxJfDX`]wymtҚU5;O %/)^Wܹ( +XJwHCgFs տ'tzw᪎CsRFZZRd/vnMVpVS>ܲ8{9Tn;i xa)e߭~OFhgeS - Mg.}w! ͅW)@2 9F9 ĔP\:HFQA8oD!IF >o,zk\u?DyuyW+56߭0«Y&p$:Fm[P/D@A˹2Xw{8o}#zӮhB75ϛ VgkZ_QI~wCo_ lB|4U\./p G@듡p/\#{}fVW6>C𢽧&%Zf0H1vVo;Dya!>RT~dSI3Ƽ&r\T=s[ޏi'oDfԕ ('Cw-J>yq˥ceo{d(gQ|Χ~>ٶ{/-B_.iBey$MAB:  qb #1&tHnV.F _r%AL%.tO܀"YffNe0جpbw5 ytXyґ ]ݞђ锵SF|VXoRGN:^ݘ{IA7_IX41ϙXek(t!sFsj ~>r !z3ZΞuBBR  6(c9SEbQ|L؍'kէe^BI)TBxȖ YZ