miltertest-1.6.0-bp154.3.3.1<>,De-֜!M@eeeo~0Κ\[JzolZ_]̓U.,t]vC8l&DS0P?=_ *t puLVTbB&KǢ; !,ؖA/%|eٮkW\2z3~, ^Q9 _tғRe W anm*7-!fPXHqV, )]l>>)?)d   8@DTXqz       @Pp  s (89:F%9G%TH%dI%tX%xY%\%]%^%b&6c&d'e'f'l'u'v'w)x)y) z)4)D)H)N)Cmiltertest1.6.0bp154.3.3.1Milter unit test utilitySimulates the MTA side of an MTA-milter interaction for testing a milter-aware filter application. It takes as input a script using the Lua language, and by exporting some utility functions, makes it possible for users to write scripts that exercise a filter.e-obs-power8-05]SUSE Linux Enterprise 15openSUSEBSD-3-Clausehttp://bugs.opensuse.orgProductivity/Networking/Diagnostichttp://www.opendkim.org/linuxppc64le@`A큤e-e-[*e-6fe3655e176da1082e155b0f29930f10a316ee4e5f88db2629fd162e90bb688efe8cfca2e2e144cd9f202712d93799300e2488232ac4c2428bc03d2902ba58d38ae2fb543279d1edeaf6d9ee5d833f57c9a399ee1a8f6f892d009589ccddc480rootrootrootrootrootrootrootrootopendkim-2.11.0-bp154.3.3.1.src.rpmmiltertestmiltertest(ppc-64)@@@@@    libbsd.so.0()(64bit)libbsd.so.0(LIBBSD_0.0)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)liblua5.1.so.5()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3e)1@amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Ferdinand Thiessen Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Add fix-RSA_sign-call.patch * Fix bsc#1216117 * Fix call of RSA sign on big endian systems, patch origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial packageobs-power8-05 16974494301.6.0-bp154.3.3.11.6.0-bp154.3.3.1miltertestmiltertestLICENSEmiltertest.8.gz/usr/bin//usr/share/licenses//usr/share/licenses/miltertest//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protectionobs://build.opensuse.org/openSUSE:Maintenance:18120/openSUSE_Backports_SLE-15-SP4_Update/49d8527c7d2f80af89294fbc5533b921-opendkim.openSUSE_Backports_SLE-15-SP4_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=19ace56cc31a1aa4a6013adcd32ac26225012cc9, for GNU/Linux 3.10.0, not strippeddirectoryASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRRR">8#NW)ڊ~utf-8f5efb45d87e98c60f2512f3dc8e8392de27c4d6197bc0fa0ef01b66c23c8ae94? 7zXZ !t/@$]"k%{W#LϰS>W}o$P[UfY[05# NRR?`CQT=%>ML5@ z%( ƛv4:5gD.|QX& 9)8:Vb1WcXv<_,w}d^@$=@" <]9vd-bS \aZN2ĞY4ϾQp E2CҺQ)7Q)'0z6<0B!mCbDxқw)?$Iԡoj+x2g[ЏdV&5yeZ֪FʇOT]uﴌo`.V8# ;P?a>ѓ;-&0~(_{ElEE#,F_i2J.OW^OEN] Wu"jNkr?2.@_9K5q&OjoN\&1)!05(Е\Mi, ^To(2.5w\\7R&W;BM%"#)sX 5 &lnX:Lr_VCUZ}҄'h'Ha~(Eo:WbcWؠ+E-mqrszs@p,{y_UT:f!u[e~Bc7lOv}EL:(*Oi~V}|. uiutJjEH^6iļF u#GG=ػ<+G`[񗜴 ]m`s҆.8 N;3F a !s3>ZWz<+r#$*́ܬ͵l2țeOluʚ5@5ɶSlw0bKg%FX4NjSΗ7jʱIS {pxTgrAC8J4tiDRE';̃1v$BriM6zPh *jx!?9YQmS gյ,fdK<x|J*w_?TOoI\T_T^o q hrkbG i x?`*>aU ֡W{ŴdVϩ;e70[i7>NJ"kb2_:YB=?d gqȰdt%.B4~&W8nvͅ!;Q vf(:r,4oј8+Hކ0XAlz릧`a4̻4H<#ta'R1ocW_<~WݯKH1&Y>4g}i;dꦉ f/6ul8&m71q Wz<'nQ Y{Hj~`ޕ(L"QK`(juf^$ȯg2Dk9yB:59[A}(|1!ey֝ueb']} _fAaX+ ŒRBȌH ͧ %HX^@ɧHK Q ;n:D鐹Һ w_o'lzXq&̯YL_?x-EZڞ(ޫOEC mua%"&Q4 *d4t \t=[6o@B.m r#=>ہdGvkl67޷Fs=Jʽ] @H4$?}*P]G),ʿEpYőH zi@- secvcy,.Gl3y/8#]BPo' kR `@*чSkJ`e俏 āUwVw,ta<Ol[c]F۸bnr-dx޼˘aB(r\`.Ddݛ۸淶P/U%lcٔ] >z-πbR"Yt 1XxdFE@:Jc'@F2gߋGRXYnR89p0:&@Syy$vŊ./W;cs98U(1p|GACIl@NpoЇθҜK S^rdRWƱ?;dhlff`ףZ6I-.Tx΅1+Kt&zÿjkM* &Õ ٰ ~pCͬq=R7!B;ёuA@R1L_Toc'ћ>\ =h/ʨڷ7 6-*ا_}3y٧>܌yG%.eER>yWe)_i-&ak+RTN-X{Y8HLzmoifH43\"ajV^%>ٱ6 pu:d{r3* fu%[IƩjہH'QJ$i (q#9xG]颷*l+N}LMl+ >И6qJEl ]ssʳYBl|EԉBK?Pz b~+љ((FX}:.N Iw:M4@ ecHh*y~`.BQ (^UФj(IXB͋/omO9XDnC2ujm |Yp+j-ncM$0X`߶U0]>NXYZ &7ظU6Sa2qmt?~fLMyT~oEA{y'#$so1H@g~MGs{Rot!Akr40ۂL[xv^f\9z/IN*ۍֽø:UsJ#c/eiN{y1(2!lXu/C&3VFOsǴx@wr/L1Ƥ= qZVDHL\exEY2TàqI/.6LTLૼQyNԫlW q(VA@Sd͐VlW=v&mRBLm;:~#?\}Rɽ1|"@4<.x#Rd40SdļgTM#_tA'F&O4x*<9dGm*E`SnI */Lq `T#J4܁e3|?JGIh7O8tb+`dS[XG$'M9KQW : Ø0GiDww~fNTS?|ac*0ˍj#EdhʆewaH'Z3m<Ą6D6aisxCء:ϻ>s]Wlyj ʢSx(IE߬hukU~Zu9b/ !w!>Pl(DD.!mZ<0@)(+"ݟr>eS>gŹg\ l}pٟR; 1H|X8j}`'y]jGYxq$Ĩf)eF+>E%1xiz49/[퇲v9ZG}J 7+oHE1o?E셸DFyruA"4xlQcȔ k8蛎KʟF6VfY&he% ɔx}l]ĺ^qZ.sw{KQb ,b!5P05xB|&GIY"@^$g(5HMQ9*aqnx]#6~*?ƿSi8&cny)iPJS6kfb嚎1NC)EbY>&DBpH>B=Ԛ pنjB(}z$Q$gt|taj/~"\0GP>7äkS PtDjC~l,6%Hri]+\icJnY$/Fyȗ5 DlsTmme}Jv{\0caK $~ gHM' Ťb,ҁ~L YZ