libopenssl-devel-32bit-1.0.1e-1.1.1>t 4 DpQh /=„ wLvu j7UcӽhUsT<nܳߪPdE,ŮҙV4Up;\؈A6v!9yxF g1xwE⻺@ZfM&I"ݫ9wa;\椳2Y_:2YMI[ { X)o${o4TVoIۤJ z$9W"|GTS}e:6Q1m:\=\"E H (MQh /=„KU;[$Gov>&;"w_KTOjP#"Znd+|/J [JO]q;"/]3Z:Gjʘ 2>/PL`+tSx%!OK5$BWL^sc[Rt(gv;pLV^Ge#r%J /_xxL &{PVuWH[9H_MKbFIgfos&Si*[ P+ jxHzMjv<2b925db8d70acbd95eebfdf5aaca750aa003e35a>7$L?$<d  & \ .7? Xx     $,dt(8898:8G"H"I"X"Y"\"]"^#b#c#d#e#f$l$u$v$ w$,x$4Clibopenssl-devel-32bit1.0.1e1.1.1Include Files and Libraries mandatory for DevelopmentThis package contains all necessary include files and libraries needed to develop applications that require these. Authors: -------- Mark J. Cox Ralf S. Engelschall Dr. Stephen Ben Laurie Bodo Moeller Ulf Moeller Holger Reif Paul C. Sutton Qhbuild16openSUSE 12.3openSUSEOpenSSLhttp://bugs.opensuse.orgDevelopment/Libraries/C and C++http://www.openssl.org/linuxx86_64QhQh/lib/libcrypto.so.1.0.0/lib/libssl.so.1.0.0rootrootrootrootopenssl-1.0.1e-1.1.1.src.rpmlibopenssl-devel-32bitlibopenssl-devel-32bit(x86-32)   libopenssl1_0_0-32bitrpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)1.0.1e3.0.4-14.0-14.4.6-14.10.2Q.QQ@PP0@P!@OOOD@OqOk@OiOhq@OG{O*zO yNj@N;@Ng\N=,N;@N-ZN|@M@MMS@M1@M*ML@L@LPL+1Lk@LLK@K @KK@KK @K @KKsKP@K[Kl@K&(J@J J#JMJI@JI@I@hrvoje.senjan@gmail.comhrvoje.senjan@gmail.commeissner@suse.comgjhe@suse.comcrrodriguez@opensuse.orgdmueller@suse.comcrrodriguez@opensuse.orglnussel@suse.degjhe@suse.comgjhe@suse.comgjhe@suse.comgjhe@suse.comcfarrell@suse.comgjhe@suse.comgjhe@suse.comgjhe@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgjengelh@medozas.degjhe@novell.comgjhe@novell.comandrea@opensuse.orggjhe@novell.comcristian.rodriguez@opensuse.orgmeissner@suse.degjhe@novell.comgjhe@novell.comgjhe@novell.comcristian.rodriguez@opensuse.orgjengelh@medozas.debg@novell.comgjhe@novell.comgjhe@novell.comaj@suse.degjhe@novell.comgjhe@novell.comcoolo@novell.comlnussel@suse.demeissner@suse.degjhe@novell.commeissner@suse.demeissner@suse.degjhe@novell.comgjhe@novell.comjengelh@medozas.dejengelh@medozas.decoolo@novell.comgjhe@novell.comcoolo@novell.comgjhe@novell.comgjhe@novell.comgjhe@novell.comgjhe@suse.de- Update to 1.0.1e o Bugfix release (bnc#803004) - Drop openssl-1.0.1d-s3-packet.patch, included upstream- Added openssl-1.0.1d-s3-packet.patch from upstream, fixes bnc#803004, openssl ticket#2975- update to version 1.0.1d, fixing security issues o Fix renegotiation in TLS 1.1, 1.2 by using the correct TLS version. o Include the fips configuration module. o Fix OCSP bad key DoS attack CVE-2013-0166 o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169 bnc#802184 o Fix for TLS AESNI record handling flaw CVE-2012-2686- fix bug[bnc#784994] - VIA padlock support on 64 systems e_padlock: add support for x86_64 gcc- Open Internal file descriptors with O_CLOEXEC, leaving those open across fork()..execve() makes a perfect vector for a side-channel attack...- fix build on armv5 (bnc#774710)- Update to version 1.0.1c for the complete list of changes see NEWS, this only list packaging changes. - Drop aes-ni patch, no longer needed as it is builtin in openssl now. - Define GNU_SOURCE and use -std=gnu99 to build the package. - Use LFS_CFLAGS in platforms where it matters.- don't install any demo or expired certs at all- update to latest stable verison 1.0.0i including the following patches: CVE-2012-2110.path Bug748738_Tolerate_bad_MIME_headers.patch bug749213-Free-headers-after-use.patch bug749210-Symmetric-crypto-errors-in-PKCS7_decrypt.patch CVE-2012-1165.patch CVE-2012-0884.patch bug749735.patch- fix bug[bnc#749735] - Memory leak when creating public keys. fix bug[bnc#751977] - CMS and S/MIME Bleichenbacher attack CVE-2012-0884- fix bug[bnc#751946] - S/MIME verification may erroneously fail CVE-2012-1165- fix bug[bnc#749213]-Free headers after use in error message and bug[bnc#749210]-Symmetric crypto errors in PKCS7_decrypt- license update: OpenSSL- fix bug[bnc#748738] - Tolerate bad MIME headers in openssl's asn1 parser. CVE-2006-7250- Update to version 1.0.0g fix the following: DTLS DoS attack (CVE-2012-0050)- Update to version 1.0.0f fix the following: DTLS Plaintext Recovery Attack (CVE-2011-4108) Uninitialized SSL 3.0 Padding (CVE-2011-4576) Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577) SGC Restart DoS Attack (CVE-2011-4619) Invalid GOST parameters DoS Attack (CVE-2012-0027)- AES-NI: Check the return value of Engine_add() if the ENGINE_add() call fails: it ends up adding a reference to a freed up ENGINE which is likely to subsequently contain garbage This will happen if an ENGINE with the same name is added multiple times,for example different libraries. [bnc#720601]- Build with -DSSL_FORBID_ENULL so servers are not able to use the NULL encryption ciphers (Those offering no encryption whatsoever).- Update to openssl 1.0.0e fixes CVE-2011-3207 and CVE-2011-3210 see http://openssl.org/news/secadv_20110906.txt for details.- Add upstream patch that calls ENGINE_register_all_complete() in ENGINE_load_builtin_engines() saving us from adding dozens of calls to such function to calling applications.- remove -fno-strict-aliasing from CFLAGS no longer needed and is likely to slow down stuff.- Edit baselibs.conf to provide libopenssl-devel-32bit too- update to latest stable version 1.0.0d. patch removed(already in the new package): CVE-2011-0014 patch added: ECDSA_signatures_timing_attack.patch- fix bug[bnc#693027]. Add protection against ECDSA timing attacks as mentioned in the paper by Billy Bob Brumley and Nicola Tuveri, see: http://eprint.iacr.org/2011/232.pdf [Billy Bob Brumley and Nicola Tuveri]- added openssl as dependency in the devel package- fix bug [bnc#670526] CVE-2011-0014,OCSP stapling vulnerability- Add patch from upstream in order to support AES-NI instruction set present on current Intel and AMD processors- enable -DPURIFY to avoid valgrind errors.- update to stable version 1.0.0c. patch included: CVE-2010-1633_and_CVE-2010-0742.patch patchset-19727.diff CVE-2010-2939.patch CVE-2010-3864.patch- fix bug [bnc#651003] CVE-2010-3864- fix bug [bnc#629905] CVE-2010-2939- Exclude static libraries, see what breaks and fix that instead- fix two compile errors on SPARC- -fstack-protector is not supported on hppa- fix bnc #610642 CVE-2010-0742 CVE-2010-1633- fix bnc #610223,change Configure to tell openssl to load engines from /%{_lib} instead of %{_libdir}- Do not compile in build time but use mtime of changes file instead. This allows build-compare to identify that no changes have happened.- build libopenssl to /%{_lib} dir,and keep only one libopenssl-devel for new developping programs.- build libopenssl and libopenssl-devel to a version directory- buildrequire pkg-config to fix provides- also create old certificate hash in /etc/ssl/certs for compatibility with applications that still link against 0.9.8- Disable our own build targets, instead use the openSSL provided ones as they are now good (or should be good at least). - add -Wa,--noexecstack to the Configure call, this is the upstream approved way to avoid exec-stack marking- update to 1.0.0 Merge the following patches from 0.9.8k: openssl-0.9.6g-alpha.diff openssl-0.9.7f-ppc64.diff openssl-0.9.8-flags-priority.dif openssl-0.9.8-sparc.dif openssl-allow-arch.diff openssl-hppa-config.diff- fixed "exectuable stack" for libcrypto.so issue on i586 by adjusting the assembler output during MMX builds.- Openssl is now partially converted to libdir usage upstream, merge that in to fix lib64 builds.- fix security bug [bnc#590833] CVE-2010-0740- update to version 0.9.8m Merge the following patches from 0.9.8k: bswap.diff non-exec-stack.diff openssl-0.9.6g-alpha.diff openssl-0.9.7f-ppc64.diff openssl-0.9.8-flags-priority.dif openssl-0.9.8-sparc.dif openssl-allow-arch.diff openssl-hppa-config.diff- build openssl for sparc64- add baselibs.conf as a source - package documentation as noarch- updated patches to apply with fuzz=0- fix Bug [bnc#526319]- use %patch0 for Patch0- update to version 0.9.8k - patches merged upstream: openssl-CVE-2008-5077.patch openssl-CVE-2009-0590.patch openssl-CVE-2009-0591.patch openssl-CVE-2009-0789.patch openssl-CVE-2009-1377.patch openssl-CVE-2009-1378.patch openssl-CVE-2009-1379.patch openssl-CVE-2009-1386.patch openssl-CVE-2009-1387.patch- fix security bug [bnc#509031] CVE-2009-1386 CVE-2009-1387- fix security bug [bnc#504687] CVE-2009-1377 CVE-2009-1378 CVE-2009-1379- fix security bug [bnc#489641] CVE-2009-0590 CVE-2009-0591 CVE-2009-07891.0.1e-1.1.11.0.1e-1.1.1libcrypto.solibssl.so/usr/lib/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:12.3/standard/f00d56e031992ada32618a849ee24be7-opensslcpiolzma5x86_64-suse-linuxdirectory?] cr$x#̚I"dZD̥Q?5KˁNpe M'D t4w{vX.T#grY^ZH1ËrH* ,P~C