libopenssl-devel-1.0.1p-74.1e>UA~ʚNyG1K!;Φ?W)߉$jiFc%y\`%> -߅ ݶ2>8wE?w5d  U 0HNTQQ :Q Q  Q Q QQmQ Qd(8Z9<Z:ZBnFnGnQHoQIq,QXqYqZq[q\qQ]sQ^ubucvsdw ewfwlwzw%Clibopenssl-devel1.0.1p74.1Include Files and Libraries mandatory for DevelopmentThis package contains all necessary include files and libraries needed to develop applications that require these.W)߉lamb06ZopenSUSE 11.4openSUSEOpenSSLhttp://bugs.opensuse.orgDevelopment/Libraries/C and C++http://www.openssl.org/linuxi586&E_s3 dY +3l.T+$4O"*hI*Ay%MfgNa@c .9Q*Yi f%.^/zoeI# ;ʁg^%/A큤W)nW)mW)nW)nW)nW)nW)nW)nW)nW)nW)nW)nW)nW)nW)nW)nW)mW)mW)mW)nW)nW)nW)nW)mW)mW)nW)nW)nW)nW)nW)nW)mW)nW)nW)nW)mW)mW)mW)nW)mW)mW)nW)mW)mW)mW)nW)nW)nW)nW)nW)nW)mW)nW)mW)nW)nW)nW)mW)nW)nW)nW)nW)nW)nW)nW)mW)nW)nW)nW)nW)nW)mW)nW)nW)nW)߃W)wW)wW)oW)oW)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.so.1.0.0/lib/libssl.so.1.0.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootopenssl-1.0.1p-74.1.src.rpmopenssl-develpkgconfig(libcrypto)pkgconfig(libssl)pkgconfig(openssl)libopenssl-devellibopenssl-devel(x86-32)   @ rpmlib(VersionedDependencies)openssllibopenssl1_0_0zlib-develrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)/usr/bin/pkg-configrpmlib(PayloadIsLzma)3.0.3-11.0.1p1.0.1p4.0-13.0.4-14.4.6-14.8.0W)@VՄ@UVUzUd`@UTq@T?@SS[Sg}@SW@SFSCS1oRR=RTR@R usable in case you have third party /dev/crypto * libgmp.so --> may help to doing some maths using GMP * libgost.so --> implements the GOST block cipher * libpadlock.so --> VIA padlock support - Al other are removed because they require third party propietary shared libraries nowhere to be found or that we can test.- openssl-pkgconfig.patch: Here we go.. For applications to benefit fully of features provided by openSSL engines (rdrand, aes-ni..etc) either builtin or in DSO form applications have to call ENGINE_load_builtin_engines() or OPENSSL_config() unfortunately from a total of 68 apps/libraries linked to libcrypto in a desktop system, only 4 do so, and there is a sea of buggy code that I dont feel like fixing. Instead we can pass -DOPENSSL_LOAD_CONF in the pkgconfig files so the needed operation becomes implicit the next time such apps are recompiled, see OPENSSL_config(3) Unfortunately this does not fix everything, because there are apps not using pkgconfig or using it incorrectly, but it is a good start.- add openssl-1.0.1c-default-paths.patch: Fix from Fedora for openssl s_client not setting CApath by default- 0005-libssl-Hide-library-private-symbols.patch: hide private symbols, this *only* applies to libssl where it is straightforward to do so as applications should not be using any of the symbols declared/defined in headers that the library does not install. A separate patch MAY be provided in the future for libcrypto where things are much more complicated and threfore requires careful testing.- compression_methods_switch.patch: Disable compression by default to avoid the CRIME attack (CVE-2012-4929 bnc#793420) Can be override by setting environment variable OPENSSL_NO_DEFAULT_ZLIB=no- Don't use the legacy /etc/ssl/certs directory anymore but rather the p11-kit generated /var/lib/ca-certificates/openssl one (fate#314991, openssl-1.0.1e-truststore.diff)- Build enable-ec_nistp_64_gcc_128, ecdh is many times faster but only works in x86_64. According to the openSSL team "it is superior to the default in multiple regards (speed, and also security as the new implementations are secure against timing attacks)" It is not enabled by default due to the build system being unable to detect if the compiler supports __uint128_t.- pick openssl-fix-pod-syntax.diff out of the upstream RT to fix build with perl 5.18- add %if tag for BuildArch. sles may also need latest openssl.- disable fstack-protector on aarch64- Update to 1.0.1e o Bugfix release (bnc#803004) - Drop openssl-1.0.1d-s3-packet.patch, included upstream- Added openssl-1.0.1d-s3-packet.patch from upstream, fixes bnc#803004, openssl ticket#2975- update to version 1.0.1d, fixing security issues o Fix renegotiation in TLS 1.1, 1.2 by using the correct TLS version. o Include the fips configuration module. o Fix OCSP bad key DoS attack CVE-2013-0166 o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169 bnc#802184 o Fix for TLS AESNI record handling flaw CVE-2012-2686- fix bug[bnc#784994] - VIA padlock support on 64 systems e_padlock: add support for x86_64 gcc- Open Internal file descriptors with O_CLOEXEC, leaving those open across fork()..execve() makes a perfect vector for a side-channel attack...- fix build on armv5 (bnc#774710)- Update to version 1.0.1c for the complete list of changes see NEWS, this only list packaging changes. - Drop aes-ni patch, no longer needed as it is builtin in openssl now. - Define GNU_SOURCE and use -std=gnu99 to build the package. - Use LFS_CFLAGS in platforms where it matters.- don't install any demo or expired certs at all- update to latest stable verison 1.0.0i including the following patches: CVE-2012-2110.path Bug748738_Tolerate_bad_MIME_headers.patch bug749213-Free-headers-after-use.patch bug749210-Symmetric-crypto-errors-in-PKCS7_decrypt.patch CVE-2012-1165.patch CVE-2012-0884.patch bug749735.patch- fix bug[bnc#749735] - Memory leak when creating public keys. fix bug[bnc#751977] - CMS and S/MIME Bleichenbacher attack CVE-2012-0884- fix bug[bnc#751946] - S/MIME verification may erroneously fail CVE-2012-1165- fix bug[bnc#749213]-Free headers after use in error message and bug[bnc#749210]-Symmetric crypto errors in PKCS7_decrypt- license update: OpenSSL- fix bug[bnc#748738] - Tolerate bad MIME headers in openssl's asn1 parser. CVE-2006-7250- Update to version 1.0.0g fix the following: DTLS DoS attack (CVE-2012-0050)- Update to version 1.0.0f fix the following: DTLS Plaintext Recovery Attack (CVE-2011-4108) Uninitialized SSL 3.0 Padding (CVE-2011-4576) Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577) SGC Restart DoS Attack (CVE-2011-4619) Invalid GOST parameters DoS Attack (CVE-2012-0027)- AES-NI: Check the return value of Engine_add() if the ENGINE_add() call fails: it ends up adding a reference to a freed up ENGINE which is likely to subsequently contain garbage This will happen if an ENGINE with the same name is added multiple times,for example different libraries. [bnc#720601]- Build with -DSSL_FORBID_ENULL so servers are not able to use the NULL encryption ciphers (Those offering no encryption whatsoever).- Update to openssl 1.0.0e fixes CVE-2011-3207 and CVE-2011-3210 see http://openssl.org/news/secadv_20110906.txt for details.- Add upstream patch that calls ENGINE_register_all_complete() in ENGINE_load_builtin_engines() saving us from adding dozens of calls to such function to calling applications.- remove -fno-strict-aliasing from CFLAGS no longer needed and is likely to slow down stuff.- Edit baselibs.conf to provide libopenssl-devel-32bit too- update to latest stable version 1.0.0d. patch removed(already in the new package): CVE-2011-0014 patch added: ECDSA_signatures_timing_attack.patch- fix bug[bnc#693027]. Add protection against ECDSA timing attacks as mentioned in the paper by Billy Bob Brumley and Nicola Tuveri, see: http://eprint.iacr.org/2011/232.pdf [Billy Bob Brumley and Nicola Tuveri]- added openssl as dependency in the devel package- fix bug [bnc#670526] CVE-2011-0014,OCSP stapling vulnerability- Add patch from upstream in order to support AES-NI instruction set present on current Intel and AMD processors- enable -DPURIFY to avoid valgrind errors.- update to stable version 1.0.0c. patch included: CVE-2010-1633_and_CVE-2010-0742.patch patchset-19727.diff CVE-2010-2939.patch CVE-2010-3864.patch- fix bug [bnc#651003] CVE-2010-3864- fix bug [bnc#629905] CVE-2010-2939- Exclude static libraries, see what breaks and fix that instead- fix two compile errors on SPARC- -fstack-protector is not supported on hppa- fix bnc #610642 CVE-2010-0742 CVE-2010-1633- fix bnc #610223,change Configure to tell openssl to load engines from /%{_lib} instead of %{_libdir}- Do not compile in build time but use mtime of changes file instead. This allows build-compare to identify that no changes have happened.- build libopenssl to /%{_lib} dir,and keep only one libopenssl-devel for new developping programs.- build libopenssl and libopenssl-devel to a version directory- buildrequire pkg-config to fix provides- also create old certificate hash in /etc/ssl/certs for compatibility with applications that still link against 0.9.8- Disable our own build targets, instead use the openSSL provided ones as they are now good (or should be good at least). - add -Wa,--noexecstack to the Configure call, this is the upstream approved way to avoid exec-stack marking- update to 1.0.0 Merge the following patches from 0.9.8k: openssl-0.9.6g-alpha.diff openssl-0.9.7f-ppc64.diff openssl-0.9.8-flags-priority.dif openssl-0.9.8-sparc.dif openssl-allow-arch.diff openssl-hppa-config.diff- fixed "exectuable stack" for libcrypto.so issue on i586 by adjusting the assembler output during MMX builds.- Openssl is now partially converted to libdir usage upstream, merge that in to fix lib64 builds.- fix security bug [bnc#590833] CVE-2010-0740- update to version 0.9.8m Merge the following patches from 0.9.8k: bswap.diff non-exec-stack.diff openssl-0.9.6g-alpha.diff openssl-0.9.7f-ppc64.diff openssl-0.9.8-flags-priority.dif openssl-0.9.8-sparc.dif openssl-allow-arch.diff openssl-hppa-config.diff- build openssl for sparc64- add baselibs.conf as a source - package documentation as noarch- updated patches to apply with fuzz=0- fix Bug [bnc#526319]- use %patch0 for Patch0- update to version 0.9.8k - patches merged upstream: openssl-CVE-2008-5077.patch openssl-CVE-2009-0590.patch openssl-CVE-2009-0591.patch openssl-CVE-2009-0789.patch openssl-CVE-2009-1377.patch openssl-CVE-2009-1378.patch openssl-CVE-2009-1379.patch openssl-CVE-2009-1386.patch openssl-CVE-2009-1387.patch- fix security bug [bnc#509031] CVE-2009-1386 CVE-2009-1387- fix security bug [bnc#504687] CVE-2009-1377 CVE-2009-1378 CVE-2009-1379- fix security bug [bnc#489641] CVE-2009-0590 CVE-2009-0591 CVE-2009-0789openssl-devellamb06 1462361993}F}^}w}x}y}p}a}f}o}c}b}}}}}}M}\}]}k}i}m}}L}P}g}l}j}n}u}v}Y}}}s}U}V}X}e}T}S}}O}N}R}z}{}}}}t}_}`}Z}h}r}d}W}}}}}}}q}Q}}}}}}[}|}}}~}}}}}}1.0.1p1.0.1p1.0.1p1.0.1p1.0.1p-74.11.0.1p-74.11.0.1popensslaes.hasn1.hasn1_mac.hasn1t.hbio.hblowfish.hbn.hbuffer.hcamellia.hcast.hcmac.hcms.hcomp.hconf.hconf_api.hcrypto.hdes.hdes_old.hdh.hdsa.hdso.hdtls1.he_os2.hebcdic.hec.hecdh.hecdsa.hengine.herr.hevp.hhmac.hkrb5_asn.hkssl.hlhash.hmd4.hmd5.hmdc2.hmodes.hobj_mac.hobjects.hocsp.hopensslconf.hopensslv.hossl_typ.hpem.hpem2.hpkcs12.hpkcs7.hpqueue.hrand.hrc2.hrc4.hripemd.hrsa.hsafestack.hseed.hsha.hsrp.hsrtp.hssl.hssl2.hssl23.hssl3.hstack.hsymhacks.htls1.hts.htxt_db.hui.hui_compat.hwhrlpool.hx509.hx509_vfy.hx509v3.hssllibcrypto.solibssl.solibcrypto.pclibssl.pcopenssl.pc/usr/include//usr/include/openssl//usr/lib//usr/lib/pkgconfig/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Evergreen:Maintenance:4634/openSUSE_Evergreen_11.4/df3db650e35048e8aaf94e22cfa4d25b-openssl.openSUSE_Evergreen_11.4drpmlzma5i586-suse-linuxaoL}bF镎v?]"k%dR*T!Y32Ө@\R~MAidX,|zwd9" gka,w)8ƛyO mSyƩP!3E$,5;Go5yWr P mمngKKa!a]p&[1 0X(C^vq4}VQ^yN  -J%Nʕ'ɶ8SUڲMxِ;\^E˛ )јnx7NL18zf4 #wBUƻ0d]0ZI?QmO:Ϥ!uUS)nCaQ#9VW)7찪Ьu2=6m˰b C%whG3d>{CNjmkcmDPm q>(ި8h 2hKgbK@~a9&8O(r{'{(AWYң}X ( K_П;8PFo K&in"eS5hEr?pgTJtvoFDOE~F ;DU]\,-Vꌭ+d&(@4a.?PgRGIA*VIVn"=4 IndEn-ٽ󴀶̐t*]?2*C._2"+) 2;1,*Y:"?L 5]R(9yBDڂ6PX3SqbMt[b 0 ,4)XҁRP6.k0ROH#KBm|yd;}%+§C}Sr͞8 خ,^GujMؚL'.